COMPUTER SECURITY (with Lawrie Brown)

A comprehensive treatment of computer security technology, including algorithms, protocols, and applications. Covers cryptography, authentication, access control, database security, intrusion detection and prevention, malicious software, denial of service, firewalls, software security, physical security, human factors, auditing, legal and ethical aspects, and trusted systems. Received the 2008 TAA award for the best Computer Science and Engineering Textbook of the year. This book provides coverage of all the subject areas specified for CISSP (Certified Information Systems Security Professional) certification.

CompSec2e


Second Edition Resources
ONLINE RESOURCES AT THIS WEB SITE

page2-pls_btn8 STUDENT RESOURCES: a list of relevant links organized by chapter and an errata sheet for the book.
page2-pls_btn8 INSTRUCTOR RESOURCES: useful links, links to Web sites for courses taught using this book, and sign-up information for a mailing list for instructors.

ONLINE RESOURCES AT PEARSON

page2-pls_btn8 PREMIUM CONTENT: additional online chapters, additional online appendices, a set of homework problems with solutions, and a number of other supporting documents. See the card at the front of this book for access information.
page2-pls_btn8 PEARSON RESOURCES FOR INSTRUCTORS: includes solutions manual, projects manual, PPT slides, and testbank.

CompSec












First Edition Resources
ONLINE RESOURCES AT THIS WEB SITE

page2-pls_btn8 STUDENT RESOURCES: a list of relevant links organized by chapter and an errata sheet for the book.
page2-pls_btn8 INSTRUCTOR RESOURCES: useful links, links to Web sites for courses taught using this book, and sign-up information for a mailing list for instructors.

ONLINE RESOURCES AT PEARSON

page2-pls_btn8 PEARSON RESOURCES FOR INSTRUCTORS: includes solutions manual, projects manual, PPT slides, and testbank.







Keep up with news about books by William Stallings on Google+ Pages.badge-e2216ca23ae3f61d130e77507e83b1bb