Security in Computing (4th Edition) and over 2 million other books are available for Amazon Kindle . Learn more

Trade in Yours
For a 0.30 Gift Card
Trade in
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Security in Computing (4th Edition) on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Security in Computing [Hardcover]

Charles P. Pfleeger , Shari Lawrence Pfleeger
5.0 out of 5 stars  See all reviews (5 customer reviews)

Available from these sellers.


Amazon Price New from Used from
Kindle Edition 51.29  
Hardcover 53.99  
Hardcover, 2 Dec 2002 --  
Paperback -- Trade-In Store
Did you know you can use your mobile to trade in your unwanted books for an Gift Card to spend on the things you want? Visit the Books Trade-In Store for more details or check out the Trade-In Amazon Mobile App Guidelines on how to trade in using a smartphone. Learn more.
There is a newer edition of this item:
Security in Computing Security in Computing 5.0 out of 5 stars (5)
In stock.

Book Description

2 Dec 2002 0130355488 978-0130355485 3

Appropriate for beginning to intermediate courses in computer security.

This sweeping revision of the classic computer security book provides an authoritative overview of computer security for every type of system, from traditional centralized systems to distributed networks and the Internet. The Third Edition has been updated to reflect the state-of-the-art in networking; cryptography; program and operating system security; administration; legal, privacy, and ethical issues, and much more. It combines core computer science concepts related to operating systems, networks, data bases, and programming, with accessible discussions of the use of cryptography and protocols. The book describes each important area from a developer's or user's point of view, lays out the security vulnerabilities and threats, and follows countermeasures to address them. Their book's layered approach is ideal for instructors who wish to customize courses based on their unique requirements. They also provide extensive pedagogical resources–including overviews, end-of-chapter reviews, lists of key terms, and updated exercises and references.

The authors are recognized experts in their fields. Lead author Dr. Charles P. Pfleeger, CISSP, is currently Master Security Architect for Cable & Wireless, one of the world's leading providers of Internet and secure infrastructure services. Co-author Dr. Shari Lawrence Pfleeger is a Senior Researcher at RAND Corporation, a not-for-profit company providing strategy and decision-making support in the public interest. They are the authors of more than a dozen previous books on computer security, software engineering, software measurement, software quality, and programming.

Supplements including a solutions manual, PowerPoints and a companion website are available.  In the "Resources" box above, please click on "Instructor."

Customers Who Bought This Item Also Bought

Product details

  • Hardcover: 746 pages
  • Publisher: Prentice Hall; 3 edition (2 Dec 2002)
  • Language: English
  • ISBN-10: 0130355488
  • ISBN-13: 978-0130355485
  • Product Dimensions: 24.2 x 18.5 x 3.4 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Bestsellers Rank: 1,020,300 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

The classic guide to information security—fully updated for the latest attacks and countermeasures

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them.

  • Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more
  • Security in Internet-based, distributed, desktop and traditional centralized applications
  • New attacks, including scripted vulnerability probing, denial of service, and buffer overflows—with symptoms and cures
  • Clear, accessible introduction to cryptography—without sophisticated math
  • Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography
  • Thoroughly revamped coverage of software engineering practices designed to enhance program security
  • Expanded coverage of risk management, contingency planning, and security policies
  • Detailed presentation of protection in general-purpose and trusted operating systems
  • Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references

Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security.

The companion website ( contains additional information, book updates, and instructor's resources.

About the Author

CHARLES P. PFLEEGER is a Master Security Architect for Cable & Wireless, the world's premier web hosting and Internet solutions provider. He regularly advises clients on secure design and implementation of network applications and architectures.

SHARI LAWRENCE PFLEEGER, senior researcher for RAND, is author of eight books on software engineering, measurement, and quality, including Software Engineering: Theory and Practice, Second Edition (Prentice Hall). She was named by The Journal of Systems and Software as one of the world's top software engineering researchers.

Foreword by Willis H. Ware.

Inside This Book (Learn More)
Browse and search another edition of this book.
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

4 star
3 star
2 star
1 star
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
8 of 8 people found the following review helpful
5.0 out of 5 stars Invaluable resource 25 Oct 2004
By T. Lake
I'm a computer science undergraduate currently studying an information security module. This book contains everything you will need to know! It is well written and far less dull than most course recommended texts i've read in the past. There are a lot of genuinely interesting subjects covered and it really is compelling reading.
A definate recommendation for anyone on a computing degree course and useful for anyone interested in data encryption and security.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Well written, lots of good info. 10 Jan 2013
By Feldoh
Format:Kindle Edition|Verified Purchase
Well, what can I say. Well written, informative, complete, descriptive but I suppose the best evidence is that I got a very good mark in the exam. Buy this if you want a good overview of the computer security field.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Top Class 20 Feb 2012
By M Hurfe
One of the best books I ever bought, good if you are student who wants to know more about internet security
I highly recommend this book. The only bad thing about this book is that it is too big and too heavy which makes it impossible for anyone to travel with it.
Other then that it is top class book and a must read book
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Great, thorough book. 22 Sep 2011
Format:Kindle Edition
I'm just starting my Ethical Hacking and Network Security course at Coventry, and so I've been doing some reading so I can be fully prepared for my first day. I got the Kindle version to save me weight when carrying it to uni and back; I've also read it in mobi format on the PC, the diagrams on the Kindle seem a little unfocused but are still readable.
Comment | 
Was this review helpful to you?
Bought this book to accompany my internet security module at university. The book reads well and describes principals well, the case studies (side-bars) and review sections help to strengthen learning. If you are a novice to Computer security and need a book to give you an overall knowledge then this is the book for you. Similarly if you are a student and are taking a security module this book is great to build a base knowledge and covers more complex issues in later chapters.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category