Buy new:
-29% $54.17$54.17
Ships from: AJIT IMPEX Sold by: AJIT IMPEX
Save with Used - Very Good
$10.15$10.15
Ships from: ThriftBooks-Atlanta Sold by: ThriftBooks-Atlanta

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Fundamentals of Computer Security Technology Facsimile Edition
Purchase options and add-ons
Tutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. For engineers and scientists interested in computer security.
- ISBN-100131089293
- ISBN-13978-0131089297
- EditionFacsimile
- PublisherPearson College Div
- Publication dateJanuary 1, 1994
- LanguageEnglish
- Dimensions7.25 x 0.75 x 9.25 inches
- Print length432 pages
Frequently purchased items with fast delivery
Editorial Reviews
About the Author
Edward Amoroso is a Distinguished Member of Technical Staff in the Secure Systems Department at AT&T Bell Laboratories. Dr. Amoroso's experience in secure systems design, development, and research has ranged from system and security engineering on the UNIX system V/MLS effort at Bell Labs to technical lead responsibilities in the development of the Trusted Software Methodology (TSM) for the U.S. Department of Defense (DoD). Dr. Amoroso also holds adjunct positions in the Computer Science Department at the Stevens Institute and the Software Engineering Department at Monmouth College.
Product details
- Publisher : Pearson College Div; Facsimile edition (January 1, 1994)
- Language : English
- Paperback : 432 pages
- ISBN-10 : 0131089293
- ISBN-13 : 978-0131089297
- Item Weight : 1.35 pounds
- Dimensions : 7.25 x 0.75 x 9.25 inches
- Best Sellers Rank: #397,963 in Books (See Top 100 in Books)
- #60 in CompTIA Certification Guides
- #802 in Computer Security & Encryption (Books)
- #1,193 in Computer Science (Books)
- Customer Reviews:
About the author

I am Dr. Edward Amoroso - author, professor, entrepreneur, and retired phone company worker on a fixed pension (honestly). My life's work is cyber security - a passion that I feed through teaching graduate students at NYU and Stevens, consulting at APL/JHU, and running a NYC-based research and advisory start-up called TAG Cyber. My career at AT&T included helping to create some early Unix security controls at Bell Labs and then later becoming the industry's second Chief Information Security Officer. I've spent some time as a Director on boards including M&T Bank, but I've since stepped down to pursue other matters. If you are reading this bio, then I presume you've had some interest in one of my books. I hope you enjoy whatever it is that you've discovered. I certainly enjoyed doing the writing.
Customer reviews
- 5 star4 star3 star2 star1 star5 star47%15%38%0%0%47%
- 5 star4 star3 star2 star1 star4 star47%15%38%0%0%15%
- 5 star4 star3 star2 star1 star3 star47%15%38%0%0%38%
- 5 star4 star3 star2 star1 star2 star47%15%38%0%0%0%
- 5 star4 star3 star2 star1 star1 star47%15%38%0%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on February 12, 2009A rigorous yet very readable textbook covering the foundations of computer security (threat trees, access control, security policies etc.) with an emphasis on mathematical modelling. Pre-chews the often obfuscated first-hand sources and presents their contents in a consistent and understandable framework. Sets each topic in its historical context and provides authoritative references. The reason I'm giving it "only" four stars rather than five is because the prose tends to be somewhat bland rather than lively and engaging; but this is nevertheless a very valuable tutorial and reference, which also features a well-annotated bibliography. As a security professional, I wouldn't want to be without this book on my shelf.
- Reviewed in the United States on August 27, 1998I read the book, mainly because I was a student in one of Dr. Amoroso's courses at Stevens Institute of Technology. If you think that all he did was read from the book, you're wrong. The book provided a great background for the upcoming classes. It introduced concepts and terms, providing the information necessary to have a basic understanding of the concept or term. It's worth having around, especially if you want or need to know theories behind computer security.
Top reviews from other countries
- Alain GriffenReviewed in the United Kingdom on April 29, 2018
3.0 out of 5 stars Three Stars
It's dated, yet worth your money as an uncredited book in Shon Harris literature