Automotive Holiday Deals Up to 50% Off Select Books Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Indie for the Holidays egg_2015 All-New Amazon Fire TV Grooming Deals Gifts Under $50 Amazon Gift Card Offer cm15 cm15 cm15 $30 Off Amazon Echo $15 Off All-New Fire Kindle Voyage BestoftheYear Outdoor Deals on HTL

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Computer Security Handbook 4th Edition

12 customer reviews
ISBN-13: 978-0471412588
ISBN-10: 0471412589
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
Condition: Used: Acceptable
Comment: Fast Shipping - Safe and Secure Bubble Mailer!
Access codes and supplements are not guaranteed with used items.
21 Used from $0.32
More Buying Choices
5 New from $52.96 21 Used from $0.32

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Get Up to 80% Back Rent Textbooks

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more | Shop now

Editorial Reviews

From the Back Cover

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company's computer system and its contents. The Computer Security Handbook provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fourth Edition continues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions you can take to eliminate them.

The collected chapters are written by renowned industry professionals. Requiring minimal technical knowledge to understand, covered topics include: foundations of computer security, threats and vulnerabilities, prevention (technical defenses and human factors), detection, remediation, management's role, and other considerations such as using encryption internationally, anonymity and identity in cyberspace, and censorship.

Protect the information and networks that are vital to your organization with Computer Security Handbook, Fourth Edition.

About the Author

SEYMOUR BOSWORTH, CDP , is president of S. Bosworth & Associates, Plainview, New York, a management consulting firm active in computing applications for banking, commerce, and industry. Since 1972 Bosworth has been a contributing editor to all four editions of the Computer Security Handbook, and he has written many articles and lectured extensively about computer security and other technical and managerial subjects. He has been responsible for design and manufacture, system analysis, programming, and operations of both digital and analog computers.
M. E. KABAY, PhD, is Associate Professor of Computer Information Systems at Norwich University, where he is also director of the graduate program in Information Assurance. During his career, he has worked as an operating systems internals and database performance specialist for Hewlett-Packard, an operations manager at a large service bureau, and a consultant in operations, performance, and security.

Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Paperback: 1224 pages
  • Publisher: Wiley; 4 edition (April 11, 2002)
  • Language: English
  • ISBN-10: 0471412589
  • ISBN-13: 978-0471412588
  • Product Dimensions: 7 x 2.2 x 10 inches
  • Shipping Weight: 4.5 pounds
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #2,140,631 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5 star
4 star
3 star
2 star
1 star
See all 12 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

17 of 17 people found the following review helpful By Sean P. Doyle on June 13, 2002
Format: Paperback Verified Purchase
This book is the Bible of information security. I stumbled into the 3rd edition (published in 1995) years ago and found it quite helpful, but dated by the time I acquired it. I was simply stunned and enthralled when I discovered a 4th edition had been published. I ordered it immediately, and waited impatiently to arrive... (2 day air)... I received it today, and I can't put it down. It has completely exceeded my expectations, which were considerable given I was very much impressed with the 3rd. This book belongs in any security professionals library. If you haven't got it, you are missing the definitive compendium of security information. Once you have mastered this text, other books do an excellent job of drilling further into the details, but few can exceed the sheer scope and thoroughness of this tome. For those worried about acquiring obsolete texts, this edition is completely current and up to date! Very impressive. Highly recommmended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
15 of 15 people found the following review helpful By Robert V. Jacobson on April 17, 2002
Format: Paperback
This is an amazing book stuffed with details of every facet of Information Technology Security. If you can't find the security guidance you want here, it doesn't exist. The material is neatly organizated into eight parts with a detailed index to make it easy to find answers. I found that by turning the pages and looking at the figures, I discovered all kinds of topics I hadn't previously thought about. Full disclosure requires me to announce that I wrote Chapter 47, and collaborated on Chapter 1, but this hasn't skewed my view of all the other chapters as outstanding work by all the other authors.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
12 of 12 people found the following review helpful By Gainfordson on November 26, 2002
Format: Paperback
I am offering an IT Security undergraduate course for the first time this Fall in a Business School environment. I reviewed many books on IT security before I selected this title for my course. The vast majority of Security books are nuts-and-bolts oriented, great for Engineers and Computer Scientists but lacking depth for the IT manager.
This book is a welcome relief since it contains such a wealth of information valuable to anyone working as an IT practitioner. It has several strenghts that other IS security books do not have: The current edition has been revised since the events of September 11th and thoughtfully reflects the change of the collective mindset of the IT world. Secondly, each Chapter is written by an expert in their respective fields. Thirdly, there is is a collection of references and links at the end of each Chapter which I found to be particularly valuable.
My course covers about half the topics in this book. The chapters on: Information Warfare, Denial of Service Attacks, Protecting Internet Visible Systems, Public Key Infrastructure and Computer Audit stand out in my mind as outstanding.
I intend to use this book again next Fall when this course is offered once more.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
9 of 9 people found the following review helpful By Mike Tarrani HALL OF FAMETOP 50 REVIEWER on July 14, 2002
Format: Paperback
This book is an anthology of carefully selected papers by experts in their respective knowledge areas. The organization of the papers is consistent with the basic principle of security - layered security in depth, and covers management responsibility, basic safeguards, and physical and technical protection, and special issues.
What makes this book such a valuable reference is the care with which the editors chose topics. Each topic area is a critical success factor to implementing and managing an effective security posture, and I especially like the inclusion of papers on "Policies, Standards and Procedures" and "Legal Issues in Computer Security" in the section devoted to Management Responsibility. The paper on risk management in this section is also excellent.
The section on basic safeguards actually goes beyond the domain of IS security by addressing disaster recovery (this discipline is independent of IS security, but is closely related), and cross functional topics, such as auditing and application controls. These topics are the core of IS security and I was pleased to see them included in the form of exceptionally well written, in-depth papers.
Other highlights, in my opinion, are "Security of Computer Data, Records, and Forms" (an often overlooked, but critical element of IS security), and "Outside Services". Both of these papers show the width and depth of the topics covered in this excellent book. If you are an IS security manager this book is an essential desk reference, and it is also useful to anyone managing production support and service delivery functions, or tasked with vendor management. In my opinion this is one of the best IS security references available and I highly recommend it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
6 of 7 people found the following review helpful By Bel G. Raggad on November 2, 2002
Format: Paperback
I always wanted to invite as many experts to speak to my students to demonstrate the applied side of IA and to complement and make sense of the overwhelming theory we bring to class. This book contained just the best paper selection any graduate IA course needs to efficiently convey real-world experience to students. The book presented vigorously the security concepts needed and covered management responsibility, basic safeguards, and physical and technical security solutions. The book also covered security policy and planning an area that is often overlooked in the IA literature. My students and I really enjoyed this book.
This book is comprehensive and complete. It is also efficiently organized into sections and well indexed and hence simple to search and read. This book is certainly a valuable reference that instructors and students have to have as a textbook. This book is also an excellent and essential desk reference any IS security administrator or IT manager needs.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse