Dieter gollmann computer security 3rd edition




















Sort order. Start your review of Computer Security. Mar 22, astaliegurec rated it did not like it. Even before the actual text starts, there's a discrepancy which bodes ill. There's no way around that. If you don't meet those requirements, don't even think about picking up this book. The biggest problem with the book is that it's written from the viewpoint of someone talking to a group of people who are already familiar with the subject: the author is merely pointing out things that those already-knowledgeable people should know.

Instead of writing to teach people the topic, the author just synthesizes his own knowledge to focus on the subject. Also, he uses words not to explain and enlighten, but to confuse and obfuscate.

For instance, his standard writing behavior is to use obscure technical terms well before he defines them. Plus, in general, as the book progresses, the exercises at the end of each chapter have less and less to do with anything discussed in the book and require such a level of expertise in huge swaths of areas that no one could possibly do them.

Some specifics: - The first five chapters are devoted to some of the theoretical underpinnings of the theory of computer security. Unfortunately, the author doesn't really explain these models. Instead, he assumes intimate knowledge of the models and talks about certain aspects of them. What's really jarring is that after solely talking about motherhood and apple pie security wise in nice, warm, fuzzy terms, he suddenly drops in "equations" from these models without explaining any of the terms or nomenclature he follows this procedure throughout the book.

Usually, after several pages you can find the definitions for what he's just said. But, unless you're familiar with what he's doing, none of this will make sense. He'll mention Multics and some consultant data base as sources, but he never gives concrete examples of what he's "explaining.

In general, the exercises assume far more knowledge than the author has provided in the text. Similarly to earlier chapters, he writes as though his readers are intimately familiar with the subject Unix, in this case and that he's merely pointing out some interesting things.

The chapter is filled with Unix commands with no structure to his delivery or explanation of where those commands come from. There's nothing in the preface of this book stating the requirement for being on and intimately familiar with a Unix system. Yet, there you are, unable to understand the chapter, and unable to do the exercises. For someone with no familiarity with the inner workings of NT, most of the chapter will be meaningless.

It's not quite as bad as Chapter 6 since NT uses a GUI for what he discusses and Unix uses the command line, but it's still frustrating. Unlike Chapter 6 and Unix, the exercises don't assume access to an NT machine, although most of them can't be done with only the information presented in the chapter.

It suffers from the same assumption that the reader is intimately familiar with the technical jargon of various systems and protocols. But, it actually involves examples. Of course, the exercises at the end of the chapter are undoable since they don't relate to anything taught in the chapter and are at a highly technically adept level.

I'm running out of space, so I won't write about the remaining seven chapters except to say that they suffer from the same things related above.

According to the course write-up, its sole prerequisite is CGS , which is a C programming course. FSU seriously needs to re-examine their use of this book. There's no chance that undergraduate students with only a C programming course under their belts and C is used nowhere in the book will get anything out of this book other than hemorrhoids.

Find another book. I rate this book 1 star out of 5. Feb 17, Frank Ahmed rated it it was amazing. This review has been hidden because it contains spoilers. To view it, click here. May 20, Beck Frost rated it really liked it. I had read 1st edition back in the late s-early s when I was obtaining my BS in a computer technology degree field. Now, I am getting my MS in a computer technology degree field and the 3rd edition was assigned for one of my classes.

Mainframes were deployed mainly in government departments and in large commercial organizations. In recent years the Air Force fieter become increasingly aware of the problem of computer security. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners.

In computer security, digital rights management DRM added a new twist to access control. Jovany Agathe rated it did not like it Dec 03,. This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website.

These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience. Necessary cookies are absolutely essential for the website to function properly.

This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Search for:. Skip to content. This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Try adding this search to your want list. Did you know that since , Biblio has used its profits to build 16 public libraries in rural villages of South America?

Home Price Comparison More search options. Customers who searched for ISBN might also be interested in this item:. New paperback. Books WorldWide Express. Seller rating : This seller has earned a 5 of 5 Stars rating from Biblio customers. Show Details Description:.



0コメント

  • 1000 / 1000