Sign in to turn on 1-Click ordering.
Trade in Yours
For a 13.14 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Tell the Publisher!
Id like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Introduction to Computer Security [Hardcover]

Michael Goodrich , Roberto Tamassia

RRP: 78.16
Price: 77.81 & FREE Delivery in the UK. Details
You Save: 0.35
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 17 April? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Hardcover 77.81  
Paperback 49.12  
Amazon.co.uk Trade-In Store
Did you know you can use your mobile to trade in your unwanted books for an Amazon.co.uk Gift Card to spend on the things you want? Visit the Books Trade-In Store for more details or check out the Trade-In Amazon Mobile App Guidelines on how to trade in using a smartphone. Learn more.

Book Description

15 Oct 2010 0321512944 978-0321512949 1

Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2).


Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with “just-enough” background in computer science. The result is a presentation of the material that is accessible to students of all levels.

Customers Who Viewed This Item Also Viewed

Product details

More About the Author

Discover books, learn about writers, and more.

Product Description

About the Author

Professors Goodrich and Tamassia are well-recognized researchers in computer security, algorithms and data structures, having published many papers on these subjects, with applications to computer security, cryptography, cloud computing, information visualization, and geometric computing. They have served as principal investigators in several joint projects sponsored by the National Science Foundation, the Army Research Office, and the Defense Advanced Research Projects Agency. They are also active in educational technology research, and they have published several books, including a widely adopted textbook on data structures and algorithms.


Michael Goodrich received his Ph.D. in computer science from Purdue University. He is currently a Chancellor’s Professor in the Department of Computer Science at University of California, Irvine. Previously, he was a professor at Johns Hopkins University. He is an editor for the Journal of Computer and Systems Sciences and the Journal of Graph Algorithms and Applications. He is a Fulbright Scholar, a Distinguished Scientist of the Association for Computing Machinery (ACM), and a Fellow of the American Association for the Advancement of Science (AAAS), the ACM, and the Institute of Electrical and Electronics Engineers (IEEE).


Roberto Tamassia received his Ph.D. in electrical and computer engineering from the University of Illinois at Urbana-Champaign. He is currently the Plastech Professor of Computer Science and the chair of the Department of Computer Science at Brown University. He is a founder and editor-in-chief for the Journal of Graph Algorithms and Applications. He previously served on the editorial board of Computational Geometry: Theory and Applications and IEEE Transactions on Computers. He is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).


In addition to their research accomplishments, the authors also have extensive experience in the classroom. For example, Goodrich has taught data structures and algorithms courses, including Data Structures as a freshman-sophomore level course, Applied Cryptography as a sophomore- junior level course, and Internet Algorithmics as an upper level course. He has earned several teaching awards in this capacity. Tamassia has taught Data Structures and Algorithms as an introductory freshman-level course and Computational Geometry as an advanced graduate course.  Over the last several years he has developed "Introduction to Computer Systems Security," a new computer security course aimed at sophomores.  His teaching of this course since 2006 has helped to shape the vision and topics of this book.  One thing that has set his teaching style apart is his effective use of interactive hypermedia presentations integrated with the web.

Inside This Book (Learn More)
Browse and search another edition of this book.
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 3.9 out of 5 stars  10 reviews
2 of 2 people found the following review helpful
4.0 out of 5 stars Required Textbook for a Networking Class 2 Jan 2013
By Sarah Kidd - Published on Amazon.com
Format:Hardcover|Amazon Verified Purchase
So, I bought this book because it was required for a class I was taking. It was actually pretty easy to read, so I didn't really have to force myself to read it. It was quite refreshing compared to other textbooks I've had to read. Not that I'll probably read it as a night-time story, but I still have it, just in case for future reference. So, overall, not too bad.
1 of 1 people found the following review helpful
5.0 out of 5 stars like it 25 Dec 2013
By Eman - Published on Amazon.com
Format:Hardcover|Amazon Verified Purchase
it has good content details, very clear and helpful, easy to read it and study it, really i love it
1 of 1 people found the following review helpful
3.0 out of 5 stars the order of the chapters seems disjointed 22 July 2013
By teresa welsh - Published on Amazon.com
Format:Hardcover|Amazon Verified Purchase
I found the flow of the book challenging and as the headline notes, the chapter order and content with the chapters seems disjointed.
1 of 1 people found the following review helpful
2.0 out of 5 stars Too expensive, for what it is... 25 Jun 2012
By Amazon Customer - Published on Amazon.com
Format:Hardcover|Amazon Verified Purchase
It is clear the author has a good understanding of the topic. The book is over priced. The author frequently uses math formulas to explain things that are not simplified by math formulas. There is a lot of good basic knowledge in the book for someone beginning in Computer Security. I gave it 2 stars because I would have paid a max of $20 for this book, and after my class which used this book, the most valuable thing I learned was a trick for creating strong but easy to remember password.
4.0 out of 5 stars Interesting, compact, useful, yet tersely expansive. 10 July 2013
By Paul - Published on Amazon.com
Format:Hardcover|Amazon Verified Purchase
This book provides an overarching coverage of the concepts of computer security in a very well organized and informative manner, however I did feel it was just a tad bit lacking in depth for topics that are highly central to cybersecurity. There are interesting expansions on topics such as how physical lock mechanisms work (lockpicking), but some of this material seems to be somewhat irrelevant to computer security directly. It seems that more expansion could have been provided for instance on Intrusion Prevention/Detection Systems or something else.

Overall though, I would highly recommend this book to anyone looking for a broad coverage of Computer Security. One of the better text books I've read.
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category