Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Choo, KKR
University of South Australia
Mawson Lakes campus, Adelaide, SA, Australia
 
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 20 reviews

   
   CSA guide to cloud computing: implementing cloud privacy and security
Samani R., Reavis J., Honan B., Syngress Publishing, Waltham, MA, 2014. 236 pp.  Type: Book (978-0-124201-25-5), Reviews: (2 of 2)

The Cloud Security Alliance (CSA) is the leading not-for-profit organization in cloud security, which is evident in the body of research they have produced over the years....

Jun 20 2016  
   Malware forensics field guide for Linux systems: digital forensics field guides
Malin C., Casey E., Aquilina J., Syngress Publishing, Waltham, MA, 2013. 624 pp.  Type: Book (978-1-597494-70-0)

Digital forensics remains an under-researched area, partly due to the interdisciplinary challenges specific to this research. The authors draw on their unique combination of experiences in law enforcement investigation (Malin, FBI Cybe...

Oct 8 2014  
  Computational intelligence in digital forensics: forensic investigation and applications
Muda A., Choo Y., Abraham A., Srihari S., Springer Publishing Company, Incorporated, New York, NY, 2014. 453 pp.  Type: Book (978-3-319058-84-9)

This edited book introduces the reader to various aspects of digital forensics and digital investigation techniques....

Jul 23 2014  
  Mobile user experience: patterns to make sense of it all
Mendoza A., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2013. 248 pp.  Type: Book (978-0-124095-14-4)

This is an interesting book, and certainly not what I was expecting when I volunteered to review it....

Jun 17 2014  
  Wireless networks and security: issues, challenges and research trends
Khan S., Pathan A., Springer Publishing Company, Incorporated, Berlin, Germany, 2013. 520 pp.  Type: Book (978-3-642361-68-5)

This edited collection provides a timely summary of recent research efforts in the wireless networks area, including a broad understanding of the issues and challenges and a discussion of security....

Sep 16 2013  
  Cooperative cellular wireless networks
Hossain E., Kim D., Bhargava V., Cambridge University Press, New York, NY, 2011. 542 pp.  Type: Book (978-0-521767-12-5)

Covering an area of current research interest, this book was a very interesting read for me. The preface does a good job of introducing the reader to the book, which consists of five main parts. The division into parts can be very usef...

Nov 1 2011  
   Spyware and adware
Aycock J., Springer Publishing Company, Incorporated, New York, NY, 2010. 200 pp.  Type: Book (9780387777405), Reviews: (1 of 4)

At nine short chapters, this book is written in a simplistic manner. Chapter 1 provides a brief yet sufficient review of the history and evolution of spyware and adware. Chapters 2 and 3 illustrate how spyware and adware can be install...

Mar 2 2011  
   Handbook of Internet crime
Jewkes Y., Yar M., Willan Publishing (UK), Oxford, UK, 2010. 654 pp.  Type: Book (978-1-843925-24-8), Reviews: (1 of 2)

This timely addition to the discussion of online crime is for readers who are new to the topic and want an easy-to-read introduction....

Dec 23 2010  
  Foundations of security analysis and design V: FOSAD 2007/2008/2009 tutorial lectures (LNCS 5705)
Aldini A., Barthe G., Gorrieri R. Springer-Verlag, New York, NY, 2009.  Type: Divisible Book

This is a compilation of selected tutorial papers from the 2007 to 2009 Foundations of Security Analysis and Design (FOSAD) schools. In the first paper, Escobar, Meadows, and Meseguer describe the Maude-NRL protocol analyzer (Maude-NPA...

Mar 10 2010  
  Global initiatives to secure cyberspace: an emerging landscape
Portnoy M., Goodman S., Springer Publishing Company, Incorporated, New York, NY, 2008. 166 pp.  Type: Book (9780387097633)

Cybercrime is essentially a transnational crime, with a modus operandi that exploits inter-state differences in the capacity to respond to such crimes. This transnational character provides cybercriminals, especially organized crime, w...

Jun 18 2009  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy