Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Management Of Computing And Information Systems (K.6)
>
Miscellaneous (K.6.m)
> Security (K.6.m...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 13 Reviews about "
Security (K.6.m...)
":
Date Reviewed
IT security controls: a guide to corporate standards and frameworks
Viegas V., Kuyucu O., Apress, New York, NY, 2022. 376 pp. Type: Book (978-1-484277-98-0)
As a consequence of the growth in criminal monetization of cybersecurity attacks and increased legislated compliance requirements, not to mention plain old business risk management, information and communications technology (ICT) systems security ...
Nov 14 2022
Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Patterson W., Winston-Proctor C., CRC Press, USA, 2019. 261 pp. Type: Book (978-1-138617-78-0)
It is a well-known fact that the weakest element of all cryptographic systems is a human being. No matter how smart mathematical methods are embedded to protect our network and computer infrastructures, nor how precisely we design the ...
Jun 21 2022
Engineering trustworthy systems: a principled approach to cybersecurity
Saydjari O. Communications of the ACM 62(6): 63-69, 2019. Type: Article
In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who w...
Nov 4 2019
Application of big data for national security: a practitioner’s guide to emerging technologies
Akhgar B., Saathoff G., Arabnia H., Hill R., Staniforth A., Bayerl P., Butterworth-Heinemann, Waltham, MA, 2015. 316 pp. Type: Book (978-0-128019-67-2)
It is a pleasure to review a compilation of current works that address diverse perspectives of the timely topic of big data analytics for national security. The work consists of 18 chapters organized by topic areas into four sections.<...
Sep 8 2016
Identity authentication based on keystroke latencies
Joyce R., Gupta G. Communications of the ACM 33(2): 168-176, 1990. Type: Article
The authors present a thorough and useful description of their work on the use of keystroke latencies (the intervals between successive keystrokes) to authenticate the identity of a computer user. Their approach requires each user to e...
Sep 1 1990
Auditing computer security: a manual with case studies
Vallabhaneni S., John Wiley & Sons, Inc., New York, NY, 1989. Type: Book (9780471626046)
As the author indicates in his preface, this book provides a great deal of useful information for various types of “experienced and novice auditors.” Despite the abundant white space in this large-format book, it is...
Jul 1 1990
The cuckoo’s egg: tracking a spy through the maze of computer espionage
Stoll C., Doubleday, New York, NY, 1989. Type: Book (9789780385249461)
All computer professionals interested in some realistic examples of systems security should read astronomer-cum-wizard Clifford Stoll’s book about his pursuit of the person he once characterized as the “wily hacker&...
May 1 1990
Security in computing
Pfleeger C., Prentice-Hall, Inc., Upper Saddle River, NJ, 1989. Type: Book (9780137989430)
Pfleeger’s book is packaged as a university text. It opens with three excellent chapters that cover the basic mathematics of encryption, decryption, and associated practices. A brief introduction to computer security, and a d...
Aug 1 1989
Building a secure computer system
Gasser M., Van Nostrand Reinhold Co., New York, NY, 1988. Type: Book (9780442230227)
Whenever a specific domain acquires some maturity, a representative monograph appears that marks this stage. This reference work of technical solutions to computer security problems accomplishes such a task. The topics it covers includ...
Aug 1 1989
Designing information systems security
Baskerville R., John Wiley & Sons, Inc., New York, NY, 1988. Type: Book (9780471917724)
Fledgling managers who have just learned that they are responsible for the security of their organizations’ data may find this book very useful. Its 177 pages of text and 3 appendices provide overviews of concepts, typical co...
May 1 1989
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy