|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: David SalomonPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: Softcover reprint of hardcover 1st ed. 2006 Dimensions: Width: 17.80cm , Height: 2.10cm , Length: 23.50cm Weight: 0.743kg ISBN: 9781849965606ISBN 10: 1849965609 Pages: 369 Publication Date: 13 October 2010 Audience: Professional and scholarly , Professional and scholarly , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsAus den Rezensionen: ! Der chronologische Abriss uber die Entwicklung der Computer-Viren ist sehr interessant und verdeutlicht ! einmal mehr, wo der eigentliche Schwerpunkt des ! Buches liegt. Richtig nutzlich sind ! die Schlussbemerkungen. ! Zahlreich Hinweise auf Literatur und Internet-Seiten garnieren den Text. ! David Salomon schmuckt zur Auflockerung den Text mit vielen Zitaten und kurzen Hintergrundgeschichten. ! Ebenfalls auflockernd sind die vielen Aubungsaufgaben, deren Losungen am Buchende nachgeschlagen werden konnen. Das Register ist sehr umfassend, man merkt, dass der Autor sehr grossen Wert auf einen detaillierten Index legt ! (Dr. Udo Seidel, in: www.wissenschaft-online.de, 28. Dez. 2008) From the reviews: ...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend. (Richard Jankowski, The Book Review Column by William Gasarch, 2008) the book is an easy-to-read collection of practical knowledge. !a useful collection of in-depth knowledge! Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. !worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations. (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007) The intended audience of this book is newcomers ! . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. ! much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material. (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008) From the reviews: ...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend. (Richard Jankowski, The Book Review Column by William Gasarch, 2008) the book is an easy-to-read collection of practical knowledge. ...a useful collection of in-depth knowledge... Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. ...worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations. (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007) The intended audience of this book is newcomers ... . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. ... much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material. (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008) From the reviews: ...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend. (Richard Jankowski, The Book Review Column by William Gasarch, 2008) the book is an easy-to-read collection of practical knowledge. ...a useful collection of in-depth knowledge... Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. ...worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations. (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007) The intended audience of this book is newcomers ... . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. ... much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material. (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008) From the reviews: ""...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend."" (Richard Jankowski, The Book Review Column by William Gasarch, 2008) ""the book is an easy-to-read collection of practical knowledge. …a useful collection of in-depth knowledge… Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. …worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations."" (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007) ""The intended audience of this book is newcomers … . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. … much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material."" (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008) Author InformationTab Content 6Author Website:Countries AvailableAll regions |