Start reading Security in Computing (4th Edition) on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device


Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.
Security in Computing (4th Edition)

Security in Computing (4th Edition) [Kindle Edition]

Charles P. Pfleeger , Shari Lawrence Pfleeger
5.0 out of 5 stars  See all reviews (6 customer reviews)

Print List Price: £71.99
Kindle Price: £54.72 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £17.27 (24%)
* Unlike print books, digital books are subject to VAT.


Amazon Price New from Used from
Kindle Edition £54.72  
Hardcover £57.60  
Paperback --  
Kindle Summer Sale: Over 500 Books from £0.99
Have you seen the Kindle Summer Sale yet? Browse selected books from popular authors and debut novelists, including new releases and bestsellers. Learn more

Customers Who Bought This Item Also Bought

Product Description

Product Description

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.

The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses.

Security in Computing, Fourth Edition , goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.

New coverage also includes

  • Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks
  • Web application threats and vulnerabilities
  • Networks of compromised systems: bots, botnets, and drones
  • Rootkits--including the notorious Sony XCP
  • Wi-Fi network security challenges, standards, and techniques
  • New malicious code attacks, including false interfaces and keystroke loggers
  • Improving code quality: software engineering, testing, and liability approaches
  • Biometric authentication: capabilities and limitations
  • Using the Advanced Encryption System (AES) more effectively
  • Balancing dissemination with piracy control in music and other digital content
  • Countering new cryptanalytic attacks against RSA, DES, and SHA
  • Responding to the emergence of organized attacker groups pursuing profit

From the Back Cover


Every day, more and more critical information is created, transmitted, and archived by computers. This ever-growing reliance on technology has made computer security a higher priority than ever before, yet the pace of computer development has far outstripped the improvements in computer security. Today's computer professionals need a comprehensive understanding of all aspects of security in computing.

Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers:

  • Viruses, worms, Trojan horses, and other forms of malicious code
  • Firewalls and the protection of networked systems
  • E-mail privacy, including PEM, PGP, key management, and certificates
  • Key escrow—both as a technology and in the “Clipper” program
  • Evaluation of trusted systems, including the Common Criteria, the ITSEC, and the Orange Book
  • Standards for program development and quality, including ISO9000 and SEI CMM
  • Administering secure installations of PCs, UNIX¨, and networked environments
  • Ethical and legal issues in computing

A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired.

Since the publication of the first edition in 1989, the number of threats to secure computing have increased, but so have the available countermeasures. This second edition has been thoroughly revised to reflect teaching experiences with the first edition and to incorporate all the latest information on computer security.

Product details

  • Format: Kindle Edition
  • File Size: 6357 KB
  • Print Length: 880 pages
  • Simultaneous Device Usage: Up to 5 simultaneous devices, per publisher limits
  • Publisher: Prentice Hall; 4 edition (23 Jan 2007)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B000P28V8G
  • Text-to-Speech: Enabled
  • X-Ray:
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Bestsellers Rank: #411,594 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Author

Discover books, learn about writers, and more.

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

4 star
3 star
2 star
1 star
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
8 of 8 people found the following review helpful
5.0 out of 5 stars Invaluable resource 25 Oct 2004
By T. Lake
I'm a computer science undergraduate currently studying an information security module. This book contains everything you will need to know! It is well written and far less dull than most course recommended texts i've read in the past. There are a lot of genuinely interesting subjects covered and it really is compelling reading.
A definate recommendation for anyone on a computing degree course and useful for anyone interested in data encryption and security.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Excellent 7 Jun 2014
By Ahmed
Format:Hardcover|Verified Purchase
I bought this for my wife and according to her it was very helpful for her in her Masters of Web Technology studies.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Well written, lots of good info. 10 Jan 2013
By Feldoh
Format:Kindle Edition|Verified Purchase
Well, what can I say. Well written, informative, complete, descriptive but I suppose the best evidence is that I got a very good mark in the exam. Buy this if you want a good overview of the computer security field.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know

Popular Highlights

 (What's this?)
We can view any threat as being one of four kinds: interception, interruption, modification, and fabrication. &quote;
Highlighted by 20 Kindle users
A threat is blocked by control of a vulnerability. &quote;
Highlighted by 20 Kindle users
An interception means that some unauthorized party has gained access to an asset. &quote;
Highlighted by 18 Kindle users

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category