
Computer Systems Security: Planning for Success
Ryan Tolboom, Newark, NJ
Publisher: Ryan Tolboom
Language: English
Formats Available
Conditions of Use
Attribution-NonCommercial-ShareAlike
CC BY-NC-SA
Reviews





The book is a great foundation but needs more content aligned with the Security+ certification exam since the majority of our students are required to take this course. It also lacks sections on ethics, privacy, and legal topics. read more
Reviewed by Kim Perez, Professor, Tidewater Community College on 6/2/24
Comprehensiveness
The book is a great foundation but needs more content aligned with the Security+ certification exam since the majority of our students are required to take this course. It also lacks sections on ethics, privacy, and legal topics.
Content Accuracy
I have only found minor errors and feel the book is overall accurate.
Relevance/Longevity
The content is extremely relevant and necessary in today's environment. I would also like to see some content on generative AI and how it is being used in computer security.
Clarity
The text is clear and concise - and appropriate for my current students.
Consistency
The book is consistent and easy to follow. Some sections could be better presented.
Modularity
The chapters are well-defined and allow for modularity with no disruption.
Organization/Structure/Flow
The book is well organized and flows well with no disruption.
Interface
I found no issues with navigation or interface.
Grammatical Errors
Only minor grammatical errors - do not significantly detract from the text.
Cultural Relevance
I did not see any issues that violate inclusivity.
CommentsThe book is a great foundation but needs more content aligned with the Security+ certification exam since most of our students must take this course. It also lacks sections on ethics, privacy, and legal topics.





One can get a graduate degree in computer systems security, so full comprehensiveness in a usable text is not actually a desirable feature. This text is appropriately comprehensive for a beginning-level on the subject. read more
Reviewed by Jan Pearce, Professor of Computer and Information Science, Berea College on 12/11/23
Comprehensiveness
One can get a graduate degree in computer systems security, so full comprehensiveness in a usable text is not actually a desirable feature. This text is appropriately comprehensive for a beginning-level on the subject.
Content Accuracy
While I have not yet used the text in my classroom, I have evaluated it for adoption, and I have found no inaccuracies.
Relevance/Longevity
Relevance and currency are of particular importance in computer systems security, and I have been impressed by this book thus far. Some of the labs will need to be kept up-to-date, but I do not see this as a failing of the text, just a necessity of the subject.
Clarity
The clarity and lack of unexplained technical jargon is one of the key reasons that I have adopted this text for a beginning-level course on this topic.
Consistency
I have not found any inconsistencies.
Modularity
It is impossible in a text of this type not to have the material build upon what has come before. This text is designed to align with the objectives CompTIA Security+ SY0-601 exam, so that drive the organization. However, the text has been very well organized into chapters, sections, subsections, and even practical labs and review questions.
Organization/Structure/Flow
While I have not yet used it, during my review I thought the organization seemed excellent. It seems very easy to follow.
Interface
It is a simple interface in a hyperlinked pdf. I found it very easy to navigate.
Grammatical Errors
I have found no grammatical or structural errors in the text.
Cultural Relevance
I have not found culturally insensitive, gender-insensitive, or other insensitive material in the text. For example, in discussing hacker culture, the presentation seems very appropriate.
CommentsI was very happy to find an open-source security book that is at a beginning level. I have adopted it for a course that I will be teaching in the summer of 2024.





The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well. read more
Reviewed by Felix Olowononi, Assistant Professor of Cybersecurity, Marymount University on 6/21/23
Comprehensiveness
The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well.
Content Accuracy
Content is accurate, error-free and unbiased.
Relevance/Longevity
The book is relevant and fits the objectives of the latest CompTIA Security + examination. This will help the authors to update the text as the objectives of the examinations of the examination changes in future.
Clarity
The book is very clear and appeals to technical and non-technical readers. The use of diagrams are also very helpful.
Consistency
In terms of terminology and framework, the text is quite consistent.
Modularity
The text is easily and readily divisible into smaller reading sections that can be assigned at different points within the course.
Organization/Structure/Flow
I think the author introduces the principle of Cryptography a bit to early (chapter 2) before foundational networking topics like Protocols (chapter 4) and Access Control (chapter 7).
Interface
The interface of the book is very satisfactory and poses no element of confusion or distraction to the reader.
Grammatical Errors
The text has no grammatical errors. The language of presentation is suitable for all readers, independent of race or ethnicity.
Cultural Relevance
I believe the book is culturally sensitive and fits readers from all races and backgrounds.
CommentsThe book serves as an introduction to the field of computer security. The author kept it simple to attract newcomers to the field and also put in screenshots of code that will appeal to advanced users. By aligning the book to the objectives of the popular CompTIA Security + SY0-601 certification examination, the book will serve many people who are transiting from other fields into the field of cybersecurity. Access to labs also puts the book above other similar ones.





This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts. read more
Reviewed by Laurie Alfaro, Associate Professor, City Colleges of Chicago on 5/12/23
Comprehensiveness
This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts.
Content Accuracy
I didn't see any glaring inaccuracies
Relevance/Longevity
The field of Cybersecurity is rapidly evolving. By the time something is in print, it is already outdated.
Clarity
Extremely clear and easy to understand
Consistency
Consistent tone and voice
Modularity
I appreciated how neatly the chapters map to a 15-week semester.
Organization/Structure/Flow
Each chapter builds nicely onto the next.
Interface
I viewed the PDF version; no issues with the interface
Grammatical Errors
No grammatical issues found
Cultural Relevance
All examples were presented in a neutral way without reference to culture or ethnicity.
Table of Contents
- Legal
- Acknowledgements
- Instructional Notes
- 1. Introduction
- 2. Cryptography
- 3. Malware
- 4. Protocols
- 5 Attacks
- 6. Security Solutions
- 7. Access Controls
- 8. Vulnerability Management and Compliance
- 9. Incident Response and Continuity
- 10. Virtualization
About the Book
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
About the Contributors
Author
Ryan Tolboom, New Jersey Institute of Technology