Information Security: Principles and Practice and over one million other books are available for Amazon Kindle. Learn more
Trade in your item
Get a $0.40
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Information Security : Principles and Practice Hardcover – October 28, 2005

ISBN-13: 978-0471738480 ISBN-10: 0471738484 Edition: 1st

10 New from $39.82 17 Used from $19.94
Amazon Price New from Used from
Kindle
"Please retry"
Hardcover
"Please retry"
$39.82 $19.94
Paperback
"Please retry"
$104.95

There is a newer edition of this item:

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Hardcover: 416 pages
  • Publisher: Wiley-Interscience; 1 edition (October 28, 2005)
  • Language: English
  • ISBN-10: 0471738484
  • ISBN-13: 978-0471738480
  • Product Dimensions: 9.6 x 6.2 x 0.9 inches
  • Shipping Weight: 1.5 pounds
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (16 customer reviews)
  • Amazon Best Sellers Rank: #832,959 in Books (See Top 100 in Books)

Editorial Reviews

Review

"…presents information security concepts and practices insightfully in an easily comprehensible style…Although primarily intended as a college course resource, this book will appeal also to many security professionals. Highly recommended." (CHOICE, April 2006)

"The book is well suited for beginners, and contains enough introductory material on a variety of topics." (Computing Reviews.com, January 9, 2006)

From the Back Cover

Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:

  • Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
  • Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
  • Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security

Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems—ranging from basic to challenging—to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint® slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.5 out of 5 stars
5 star
12
4 star
2
3 star
1
2 star
0
1 star
1
See all 16 customer reviews
Heard he is working on a new book and can't wait to purchase it also.
Alleta K. Baltes
The breadth and depth of coverage is appropriate for both the general reader as well as for the expert.
Richard M. Low
For the persons who study information security, I strongly recommend this book to read.
Tae Nam Ahn

Most Helpful Customer Reviews

7 of 8 people found the following review helpful By David Blockus on November 3, 2005
Format: Hardcover
This text is an excellent introduction to the popular, important subjects of computer and network security, and is the best such text that I have yet seen. Professor Stamp offers clarity of presentation and a fluid, conversational style. There is an nice balance between comprehensive coverage and detailed analysis. Overall, I really like the structural organization, selection of topics, breadth of coverage, and level of difficulty. No special prerequisites are required to comprehend the basic ideas. However, readers with technical backgrounds will find a lot of material to challenge them. There are an abundance of illustrative figures, nice examples within the body of the text, and a wealth of good problems at the end of each chapter. The author provides excellent references for further study. Appendices delve into details concerning mathematical underpinnings and networking details.

The book is divided into four main parts: cryptography, access control, protocols, and software. The cryptography section introduces fascinating historical vignettes, then explores details of modern block and stream ciphers. The author includes an excellent chapter on cryptanalysis. He provides specific examples, using mathematics and Boolean logic. The access control section explains issues of policy and implementation, regarding authentication and authorization. The protocols section discusses specific mechanisms for secure exchange of confidential information. The final section describes management of software flaws and related security issues.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 6 people found the following review helpful By Daniel Yerelian on January 1, 2006
Format: Hardcover
Dr. Stamp touches many of the widely used and implemented security algorithms and techniques in today's industry. His clear and concise diagrams, examples, and thought provoking questions allow the reader to get a clear overview of the workings (positive and negative) of security technology. Mark Stamp has gathered all relevant information from a wide range of sources to produce an essential guide for information security. totally sweet
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By R. Sweet on November 14, 2010
Format: Hardcover Verified Purchase
I needed this book for a class on E-commerce and Computer security. It's actually pretty decent. I feel like the majority of my text books required for classes are useless, but this one is good. I actually was able to learn from reading it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By T. S. Sally on October 26, 2009
Format: Hardcover
While Matt Bishop's book (Computer Security, Art and Science) is considered the standard by many professors, I think students will find that Mark Stamp's book provides much more practical utility. Here's what Stamp has that Bishop doesn't:

1.) More readable writing style.

2.) Non-essential theory and rigor removed.

3.) Some less traditional but interesting topics (ex: CAPTCHAs, DRM).

A few things that Bishop has that Stamp doesn't:

1.) Broader range of topics covered.

2.) Classic proofs and theory that Stamp omits for succinctness.

Let's be clear though. One text is not better than the other-- the authors simply have different aims. I suggest that a student use Stamp's book to ease into Information Security, and then to go Bishop when more information is required. For example, in my introductory course to Information Assurance, I used Stamp's book to answer 90% of all questions quickly and completely and Bishop's book to tackle the remaining 10%. If I ever get into the theory side of IA, I'll probably have to use Bishop more, but Stamp works great in most situations.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Thomas I. Amadio on August 22, 2007
Format: Hardcover
This is a very readable primer on information security that address a number of topics including symmetric key crypto, public key crypto, hash functions, cryptanalysis, authentication, authorization, software anomalies, software insecurity, malware, and operating systems. I recommend this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Fred Cohen on November 21, 2005
Format: Hardcover
Mark has written an excellent book on technical aspects of information protection. For the coverage he provides, he has done an excellent job of explaining things at a technical level suited to students in undergraduate computer science classes or other similar corporate arenas. Well written, nicely done, and well worth the price tag.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 8 people found the following review helpful By kernit on October 17, 2005
Format: Hardcover
A+++. Best security book ever. Covers almost all security related topics. I had to buy 3 different books to study security and still didn't understand so many protocols, etc. This single book covers it all in a very simple and easy to understand language. Its a must have for anybody wanting to study security for the first time or for expert-security users wanting to brush up their knowledge.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 7 people found the following review helpful By Richard M. Low on January 27, 2006
Format: Hardcover
If I had to have only one book on information security, this would be the book!

Without trying to be encyclopedic, Professor Stamp gives a panoramic view of four key areas in information security: cryptography, access control, protocols, and software. Within each of these four parts, relevant and diverse topics are discussed and studied. The breadth and depth of coverage is appropriate for both the general reader as well as for the expert.

Topics in the book include: symmetric key crypto, public key crypto, hash functions, cryptanalysis, authentication, authorization, authentication protocols, real-world security protocols, software flaws and malware, insecurity in software, operating systems and security.

The book reads well and does not have the "dry flavor", so often found in other books of this type. I recommend this book, without reservation!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?