Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Computer Security Handbook Paperback – April 11, 2002

ISBN-13: 978-0471412588 ISBN-10: 0471412589 Edition: 4th

12 New from $16.09 17 Used from $1.43
Amazon Price New from Used from
Paperback
"Please retry"
$16.09 $1.43

There is a newer edition of this item:

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Frequently Bought Together

Computer Security Handbook + Managing the Human Factor in Information Security: How to win over staff and influence business managers
Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 1224 pages
  • Publisher: Wiley; 4 edition (April 11, 2002)
  • Language: English
  • ISBN-10: 0471412589
  • ISBN-13: 978-0471412588
  • Product Dimensions: 10 x 7 x 2.2 inches
  • Shipping Weight: 4.5 pounds
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #1,593,361 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company's computer system and its contents. The Computer Security Handbook provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fourth Edition continues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions you can take to eliminate them.

The collected chapters are written by renowned industry professionals. Requiring minimal technical knowledge to understand, covered topics include: foundations of computer security, threats and vulnerabilities, prevention (technical defenses and human factors), detection, remediation, management's role, and other considerations such as using encryption internationally, anonymity and identity in cyberspace, and censorship.

Protect the information and networks that are vital to your organization with Computer Security Handbook, Fourth Edition.

About the Author

SEYMOUR BOSWORTH, CDP , is president of S. Bosworth & Associates, Plainview, New York, a management consulting firm active in computing applications for banking, commerce, and industry. Since 1972 Bosworth has been a contributing editor to all four editions of the Computer Security Handbook, and he has written many articles and lectured extensively about computer security and other technical and managerial subjects. He has been responsible for design and manufacture, system analysis, programming, and operations of both digital and analog computers.
M. E. KABAY, PhD, is Associate Professor of Computer Information Systems at Norwich University, where he is also director of the graduate program in Information Assurance. During his career, he has worked as an operating systems internals and database performance specialist for Hewlett-Packard, an operations manager at a large service bureau, and a consultant in operations, performance, and security.

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.7 out of 5 stars
5 star
10
4 star
0
3 star
2
2 star
0
1 star
0
See all 12 customer reviews
I highly recommend this book to both the novice and security professional.
Professor K. M. Burns
This book contained just the best paper selection any graduate IA course needs to efficiently convey real-world experience to students.
Bel G. Raggad
This is an amazing book stuffed with details of every facet of Information Technology Security.
Robert V. Jacobson

Most Helpful Customer Reviews

17 of 17 people found the following review helpful By Sean P. Doyle on June 13, 2002
Format: Paperback Verified Purchase
This book is the Bible of information security. I stumbled into the 3rd edition (published in 1995) years ago and found it quite helpful, but dated by the time I acquired it. I was simply stunned and enthralled when I discovered a 4th edition had been published. I ordered it immediately, and waited impatiently to arrive... (2 day air)... I received it today, and I can't put it down. It has completely exceeded my expectations, which were considerable given I was very much impressed with the 3rd. This book belongs in any security professionals library. If you haven't got it, you are missing the definitive compendium of security information. Once you have mastered this text, other books do an excellent job of drilling further into the details, but few can exceed the sheer scope and thoroughness of this tome. For those worried about acquiring obsolete texts, this edition is completely current and up to date! Very impressive. Highly recommmended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 15 people found the following review helpful By Robert V. Jacobson on April 17, 2002
Format: Paperback
This is an amazing book stuffed with details of every facet of Information Technology Security. If you can't find the security guidance you want here, it doesn't exist. The material is neatly organizated into eight parts with a detailed index to make it easy to find answers. I found that by turning the pages and looking at the figures, I discovered all kinds of topics I hadn't previously thought about. Full disclosure requires me to announce that I wrote Chapter 47, and collaborated on Chapter 1, but this hasn't skewed my view of all the other chapters as outstanding work by all the other authors.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
12 of 12 people found the following review helpful By Gainfordson on November 26, 2002
Format: Paperback
I am offering an IT Security undergraduate course for the first time this Fall in a Business School environment. I reviewed many books on IT security before I selected this title for my course. The vast majority of Security books are nuts-and-bolts oriented, great for Engineers and Computer Scientists but lacking depth for the IT manager.
This book is a welcome relief since it contains such a wealth of information valuable to anyone working as an IT practitioner. It has several strenghts that other IS security books do not have: The current edition has been revised since the events of September 11th and thoughtfully reflects the change of the collective mindset of the IT world. Secondly, each Chapter is written by an expert in their respective fields. Thirdly, there is is a collection of references and links at the end of each Chapter which I found to be particularly valuable.
My course covers about half the topics in this book. The chapters on: Information Warfare, Denial of Service Attacks, Protecting Internet Visible Systems, Public Key Infrastructure and Computer Audit stand out in my mind as outstanding.
I intend to use this book again next Fall when this course is offered once more.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 9 people found the following review helpful By Mike Tarrani HALL OF FAMETOP 10 REVIEWER on July 14, 2002
Format: Paperback
This book is an anthology of carefully selected papers by experts in their respective knowledge areas. The organization of the papers is consistent with the basic principle of security - layered security in depth, and covers management responsibility, basic safeguards, and physical and technical protection, and special issues.
What makes this book such a valuable reference is the care with which the editors chose topics. Each topic area is a critical success factor to implementing and managing an effective security posture, and I especially like the inclusion of papers on "Policies, Standards and Procedures" and "Legal Issues in Computer Security" in the section devoted to Management Responsibility. The paper on risk management in this section is also excellent.
The section on basic safeguards actually goes beyond the domain of IS security by addressing disaster recovery (this discipline is independent of IS security, but is closely related), and cross functional topics, such as auditing and application controls. These topics are the core of IS security and I was pleased to see them included in the form of exceptionally well written, in-depth papers.
Other highlights, in my opinion, are "Security of Computer Data, Records, and Forms" (an often overlooked, but critical element of IS security), and "Outside Services". Both of these papers show the width and depth of the topics covered in this excellent book. If you are an IS security manager this book is an essential desk reference, and it is also useful to anyone managing production support and service delivery functions, or tasked with vendor management. In my opinion this is one of the best IS security references available and I highly recommend it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 7 people found the following review helpful By Bel G. Raggad on November 2, 2002
Format: Paperback
I always wanted to invite as many experts to speak to my students to demonstrate the applied side of IA and to complement and make sense of the overwhelming theory we bring to class. This book contained just the best paper selection any graduate IA course needs to efficiently convey real-world experience to students. The book presented vigorously the security concepts needed and covered management responsibility, basic safeguards, and physical and technical security solutions. The book also covered security policy and planning an area that is often overlooked in the IA literature. My students and I really enjoyed this book.
This book is comprehensive and complete. It is also efficiently organized into sections and well indexed and hence simple to search and read. This book is certainly a valuable reference that instructors and students have to have as a textbook. This book is also an excellent and essential desk reference any IS security administrator or IT manager needs.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again