Conditions of Use
The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well. read more
The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well.
Content is accurate, error-free and unbiased.
The book is relevant and fits the objectives of the latest CompTIA Security + examination. This will help the authors to update the text as the objectives of the examinations of the examination changes in future.
The book is very clear and appeals to technical and non-technical readers. The use of diagrams are also very helpful.
In terms of terminology and framework, the text is quite consistent.
The text is easily and readily divisible into smaller reading sections that can be assigned at different points within the course.
I think the author introduces the principle of Cryptography a bit to early (chapter 2) before foundational networking topics like Protocols (chapter 4) and Access Control (chapter 7).
The interface of the book is very satisfactory and poses no element of confusion or distraction to the reader.
The text has no grammatical errors. The language of presentation is suitable for all readers, independent of race or ethnicity.
I believe the book is culturally sensitive and fits readers from all races and backgrounds.
The book serves as an introduction to the field of computer security. The author kept it simple to attract newcomers to the field and also put in screenshots of code that will appeal to advanced users. By aligning the book to the objectives of the popular CompTIA Security + SY0-601 certification examination, the book will serve many people who are transiting from other fields into the field of cybersecurity. Access to labs also puts the book above other similar ones.
This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts. read more
This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts.
I didn't see any glaring inaccuracies
The field of Cybersecurity is rapidly evolving. By the time something is in print, it is already outdated.
Extremely clear and easy to understand
Consistent tone and voice
I appreciated how neatly the chapters map to a 15-week semester.
Each chapter builds nicely onto the next.
I viewed the PDF version; no issues with the interface
No grammatical issues found
All examples were presented in a neutral way without reference to culture or ethnicity.
Table of Contents
- Instructional Notes
- 1. Introduction
- 2. Cryptography
- 3. Malware
- 4. Protocols
- 5 Attacks
- 6. Security Solutions
- 7. Access Controls
- 8. Vulnerability Management and Compliance
- 9. Incident Response and Continuity
- 10. Virtualization
About the Book
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
About the Contributors
Ryan Tolboom, New Jersey Institute of Technology