• List Price: CDN$ 187.65
  • You Save: CDN$ 18.02 (10%)
Only 9 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Introduction to Computer ... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Buy with confidence. Excellent Customer Service & Return policy.Ships from USA. Please give between 2-5 week for delivery.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Introduction to Computer Security Hardcover – Oct 15 2010

3.0 out of 5 stars 1 customer review

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 169.63
CDN$ 156.00 CDN$ 146.58
"Please retry"
CDN$ 124.69

There is a newer edition of this item:

Introduction to Computer Security
Currently unavailable.

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Hardcover: 576 pages
  • Publisher: Pearson; 1 edition (Oct. 15 2010)
  • Language: English
  • ISBN-10: 0321512944
  • ISBN-13: 978-0321512949
  • Product Dimensions: 20.8 x 2.8 x 25.7 cm
  • Shipping Weight: 1.4 Kg
  • Average Customer Review: 3.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #451,498 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Back Cover

A new Computer Security textbook for a new generation of IT professionals.

Unlike most other computer security books available today,Introduction to Computer Security, 1e does NOT focus on themathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks atthe systems, technology, management, and policy side of security, and offers readers fundamental security concepts and a working knowledge of threats and countermeasures with “just-enough background in computer science. The result is a presentation of the material that is accessible to readers of all levels.


Readers of this book will learn about common cyberattacks, including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. They will also learn about techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. Finally, they will study fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols.


Anyone interested in a very accessible introduction to computer security.

About the Author

Professors Goodrich and Tamassia are well-recognized researchers in computer security, algorithms and data structures, having published many papers on these subjects, with applications to computer security, cryptography, cloud computing, information visualization, and geometric computing. They have served as principal investigators in several joint projects sponsored by the National Science Foundation, the Army Research Office, and the Defense Advanced Research Projects Agency. They are also active in educational technology research, and they have published several books, including a widely adopted textbook on data structures and algorithms.


Michael Goodrich received his Ph.D. in computer science from Purdue University. He is currently a Chancellor’s Professor in the Department of Computer Science at University of California, Irvine. Previously, he was a professor at Johns Hopkins University. He is an editor for the Journal of Computer and Systems Sciences and the Journal of Graph Algorithms and Applications. He is a Fulbright Scholar, a Distinguished Scientist of the Association for Computing Machinery (ACM), and a Fellow of the American Association for the Advancement of Science (AAAS), the ACM, and the Institute of Electrical and Electronics Engineers (IEEE).


Roberto Tamassia received his Ph.D. in electrical and computer engineering from the University of Illinois at Urbana-Champaign. He is currently the Plastech Professor of Computer Science and the chair of the Department of Computer Science at Brown University. He is a founder and editor-in-chief for the Journal of Graph Algorithms and Applications. He previously served on the editorial board of Computational Geometry: Theory and Applications and IEEE Transactions on Computers. He is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).


In addition to their research accomplishments, the authors also have extensive experience in the classroom. For example, Goodrich has taught data structures and algorithms courses, including Data Structures as a freshman-sophomore level course, Applied Cryptography as a sophomore- junior level course, and Internet Algorithmics as an upper level course. He has earned several teaching awards in this capacity. Tamassia has taught Data Structures and Algorithms as an introductory freshman-level course and Computational Geometry as an advanced graduate course.  Over the last several years he has developed "Introduction to Computer Systems Security," a new computer security course aimed at sophomores.  His teaching of this course since 2006 has helped to shape the vision and topics of this book.  One thing that has set his teaching style apart is his effective use of interactive hypermedia presentations integrated with the web.

Customer Reviews

3.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Hardcover Verified Purchase
A boring read, chapters are long and its not the most exciting stuff. Talks more about concepts, and if your looking for how to hack or how to program good security software this will give you the fundamentals, but overall its dry.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x9b37d5a0) out of 5 stars 21 reviews
4 of 4 people found the following review helpful
HASH(0x9b3771f8) out of 5 stars Some good some bad June 4 2014
By Personof1 - Published on Amazon.com
Format: Hardcover
I am currently using this book for a class i'm taking. It is very good in explaining concepts. Unfortunately, many of the exercises in the first 4 chapters so far come with the expectation that you know how to do advanced programming in several programming languages, and do projects like asking you to write a software keylogger, or write a simulator.

On one hand it says it could be used as the 2nd course in a computer science sequence after the introductory computer science course, and then in the next paragraph says they assume the reader is familiar with a high level programming language and it's main constructs.

If your instructor decides to give you the programming homework and programming is not a prerequisite, like it isn't for my class you might need to learn C++ on the fly and I might need a tutor to get though them.....
4 of 4 people found the following review helpful
HASH(0x9b377270) out of 5 stars Required Textbook for a Networking Class Jan. 2 2013
By Sarah Kidd - Published on Amazon.com
Format: Hardcover Verified Purchase
So, I bought this book because it was required for a class I was taking. It was actually pretty easy to read, so I didn't really have to force myself to read it. It was quite refreshing compared to other textbooks I've had to read. Not that I'll probably read it as a night-time story, but I still have it, just in case for future reference. So, overall, not too bad.
2 of 2 people found the following review helpful
HASH(0x9b426e28) out of 5 stars Too expensive, for what it is... June 24 2012
By Zen - Published on Amazon.com
Format: Hardcover Verified Purchase
It is clear the author has a good understanding of the topic. The book is over priced. The author frequently uses math formulas to explain things that are not simplified by math formulas. There is a lot of good basic knowledge in the book for someone beginning in Computer Security. I gave it 2 stars because I would have paid a max of $20 for this book, and after my class which used this book, the most valuable thing I learned was a trick for creating strong but easy to remember password.
1 of 1 people found the following review helpful
HASH(0x9b0bcb7c) out of 5 stars Interesting, compact, useful, yet tersely expansive. July 9 2013
By Paul - Published on Amazon.com
Format: Hardcover Verified Purchase
This book provides an overarching coverage of the concepts of computer security in a very well organized and informative manner, however I did feel it was just a tad bit lacking in depth for topics that are highly central to cybersecurity. There are interesting expansions on topics such as how physical lock mechanisms work (lockpicking), but some of this material seems to be somewhat irrelevant to computer security directly. It seems that more expansion could have been provided for instance on Intrusion Prevention/Detection Systems or something else.

Overall though, I would highly recommend this book to anyone looking for a broad coverage of Computer Security. One of the better text books I've read.
By revi - Published on Amazon.com
Format: Hardcover Verified Purchase
Pros: usually not too technical
broad scope
doesn't require too much background knowledge (it's an intro book)
up-to-date (as of beginning 2012 at least)

Cons: some explanations can be very unclear (ex. the Kerberos explanation doesn't make complete sense)
some questions ask for solutions that aren't covered in the book
some questions are unclear

While the book can be okay in parts (mainly because I thought it was interesting), while trying to do homework from it I had a significant amount of trouble. Many questions are very unclear and extremely frustrating to try to solve. Some explanations require a lot of extra online work and research to fully understand.