Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Computer Security

Computer Security

List Price: $60.00
Your Price: $55.89
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Outstanding textbook on the subject
Review: This is a great work for experienced systems and network engineers to study the subject of computer security.

The author covers a range of topics in the computer security field. This includes history, standard security models, evaluations (including a discussion of the NSA rainbow series), explanations of famous exploits, and specifics regarding well known operating systems.

I highly recommend this to anyone experienced in information technology who wishes to learn about the subject of computer security. Note that the book is presented as a textbook, and is not a step-by-step how-to. It is for this reason that the book is best read by individuals already experienced in the technology field.

Rating: 1 stars
Summary: Worst Textbook I've Ever Read
Review: This is, without doubt, the worst textbook I've ever had the misfortune to encounter. But, before I get into that, I'd first like to point out a discrepancy between the back cover and the preface which goes a long way towards explaining why this book is so bad. The back cover says: "Written for *self-study* and course use, this book will suit a variety of *introductory* and more advanced security programs for students of computer science, engineering and related disciplines." This is a lie. The preface is a tad more truthful, if you know to look for it: "This book grew out of my lecture notes for courses taught on a one-year *postgraduate* programme on information security." In a nutshell, no person at a Computer Science/Computer Security introductory level will be able to get anything out of this book. The reader MUST already be fully knowledgeable about Unix, NT, Multics, and various computer security models and jargon. There's no way around that. If you don't meet those requirements, don't even think about picking up this book.

Back to the book's content: it's written from the viewpoint of someone talking to a group of people who are already familiar with the subject and the author is merely pointing out things that those already-knowledgeable people should know. Instead of writing to teach people the topic, the author comes across as synthesizing past knowledge to focus on his subject. Also, he seems to be in a habit of using words not to explain and enlighten, but to confuse and obfuscate. In addition, his standard writing behavior is to use obscure technical terms well before he defines them. Plus, in general, as the book progresses, the exercises at the end of each chapter have less and less to do with anything discussed in the book and require such a level of expertise in huge swaths of areas that no one could possibly do them. Some specifics:

The first five chapters are devoted to some of the theoretical underpinnings of the theory of computer security. Unfortunately, as generalized above, the author doesn't really explain these models. Instead, he assumes intimate knowledge of the models and talks about certain aspects of them. What's really jarring is that after solely talking about motherhood and apple-pie (security wise) in nice, warm, fuzzy terms, he suddenly drops in "equations" from these models without explaining any of the terms or nomenclature (he follows this procedure throughout the book: warm generalities with a sudden dip into equations and inner-sanctum technical terminology). Usually, after several pages you can find the definitions of what he's just dumped in your lap. But, unless you're familiar with what he's doing, none of this will make sense.

For icing, in these first five chapters, the author uses virtually NO examples (which, for the most part, continues throughout the book). He'll mention Multics and some consultant data base as sources, but he never gives concrete examples of what he's "explaining." Even worse, with no examples in the text, the author asks the reader to provide examples of what he's talking about in the exercises. In general, the exercises assume far more knowledge than the author has provided in the text.

In chapter 6, "Unix Security," theoretically, he moves into "examples" of where these models are used. Again, similarly to earlier chapters, he writes as though his readers are intimately familiar with what he's talking about (Unix, in this case) and that he's merely pointing out some interesting things. The chapter is filled with Unix commands with no structure to his delivery or explanation of where those commands come from. Plus, when you get to the exercises at the end of the chapter, they're mostly of the type that require you to SIGN ON TO YOUR UNIX SYSTEM AND DO THINGS! There's nothing in the preface of this book stating the requirement for being on (and intimately familiar with) a Unix system. Yet, there you are, unable to understand the chapter, and unable to do the exercises.

Chapter 7, "Windows NT Security," is almost as bad. For someone with no familiarity with the inner workings of NT, most of the chapter will be gobbledy-gook. It's not quite as bad as Chapter 6 since NT uses a GUI for what he discusses and Unix uses the command line, but it's still frustrating. Unlike Chapter 6 and Unix, the exercises don't assume access to an NT machine, although most of them can't be done with only the information presented in the chapter.

Chapter 8, "How Things Go Wrong," is actually somewhat interesting. It suffers from the same assumption that the reader is intimately familiar with the technical jargon of various systems and protocols. But, it actually involves examples. Of course, the exercises at the end of the chapter are undoable since they don't relate to anything taught in the chapter and are at a highly technically adept level.

I'm running out of space for this review, so I won't write about the remaining seven chapters except to say that they suffer from the same things related above. I'd also like to include some advice to Florida State University (FSU): this book is the text for an elective (CIS 4360: "Introduction to Computer Security") in their Computer Science degree. According to the course write-up, its sole prerequisite is CGS 3408, which is a C programming course. You seriously need to re-examine your use of this book. There's no chance that an undergraduate student with only a C programming course under his belt (and C is used nowhere in the book) will get anything out of this book other than hemorrhoids. Find another book.

In summary, I give this book 1 star out of 5. Avoid at all costs.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates