Buy Used
Condition: Used: Good
Comment: Used Good condition book may have signs of cover wear and/or marks on corners and page edges. Inside pages may have highlighting, writing and underlining. All purchases eligible for Amazon customer service and a 30-day return policy.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Corporate Computer and Network Security (Pie) Hardcover – 17 Mar 2003

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
£18.94 £1.27

There is a newer edition of this item:

Corporate Computer and Network Security
Temporarily out of stock.

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your e-mail address or mobile phone number.

Product details

More About the Author

Discover books, learn about writers, and more.

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) HASH(0x9fb3a450) out of 5 stars 11 reviews
2 of 2 people found the following review helpful
HASH(0x9f03fc00) out of 5 stars makes for a poor textbook on computer security 26 Jan. 2008
By K. Eng - Published on
Format: Hardcover
While I can appreciate the need for a grounding in the basics of computer security the author goes about it poorly. The book layout on first pass seems passable with gratuitous usage of charts and visuals, but as the reader goes through the actual information you begin to realize that much of the information is rehashed in various forms. If you were to cut out the added redundancy, the book would be two-thirds it current size.

I also agree with a previous reviewer that some of the information seems a bit contrived or made-up in terms of modern day lingo use. The "drive by hacking" descrip the author uses in chapter two is accurate, but is more prevalently known as wardriving but the author does not identify that to the reader.

One thing the author does do well is reinforce concepts through questions that are interspersed throughout each chapter as well as "Thought questions" at the end of them. This being a first edition, I hope that subsequent editions are improved especially considering the price of the text. As book alternatives, Network Security Bible (basic level) and Security Warrior (intermediate) are good reads at a more palatable price.
4 of 5 people found the following review helpful
HASH(0x9d3a1bf4) out of 5 stars Excellent for Management level 18 Mar. 2006
By JR - Published on
Format: Hardcover
I just finished reading this one and I found it to be very helpful for a person trying to find management level understanding of security, I have been working with networking and security for the last 10 years of my life and it has been very helpful to pinpoint several management aspects that technology savvy people (I prefer that over geek) usually don't follow or look at. I enjoyed the explanations, everything was very easy to read and understand, the introduction to cryptography is simply one of the best I have found out there. Again, if you are a technical guru looking for technical advice there is no much use to it in this book, OS, Networks and other practitioner level stuff are not well defined, simply mentioned for reference or examples. Another part I liked about it was the level of detail that the author had to reference the attacks and statistics, which a lot of us love to read and know about. Finally, make sure to get edition 5 of the book, I am referring to edition 4, I am sure that there is a lot to cover in a couple years regarding security and the way to go about it. I got the book from the university package so I wont be getting the new one, it's simply overpriced in my opinion.
1 of 1 people found the following review helpful
HASH(0x9f040e58) out of 5 stars lots of pages with very small knowledge 13 Nov. 2012
By PolatA - Published on
Format: Paperback Verified Purchase
The book is not that useful. It has some information but the subjects are told very very slowly. You can just summarize the book in 10 pages or so. Useless...
7 of 11 people found the following review helpful
HASH(0x9f3aa0a8) out of 5 stars Network Security? 20 Jan. 2005
By Jess - Published on
Format: Hardcover
I purchased a copy of this book for a network security class. In a way it has been a great read, for humor. The terms and programs are dated at best, made up at worst. An example, 'drive-by hacking,'I have NEVER seen this anywhere. It is commonly refered to as 'war driving,' showing its lineage to 'war dialing' or 'Snooping'. I have worked in IT security for the past 3 years and I find this book insulting. But, for a plus, it is a convenent size to use as a clip board, and it does hold papers down on my desk well.
3 of 5 people found the following review helpful
HASH(0x9cf7e960) out of 5 stars An excellent book 1 Nov. 2003
By Ruidi Chu - Published on
Format: Hardcover
This is an excellent book talking about the up to date issues about security. The book is very organized and concise, allowing readers to follow the author's concept easily. The "Test Your Understanding" sections within each chapter are good tools for readers to recap their understandings. This book is highly recommended.
Ruidi Chu
Were these reviews helpful? Let us know