Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Exploring the security landscape : non-traditional security challenges
Masys A., Springer International Publishing, New York, NY, 2016. 325 pp. Type: Book (978-3-319279-13-8)
Date Reviewed: Jul 20 2016

Approximately 20 international authors contribute 15 chapters to aspects of the contemporary transnational security landscape. Collectively they provide a big-picture snapshot of contemporary research and concerns. Advanced students, scholars, and practitioners will want to review these studies.

Some topics considered include transnational security conversations, maritime security, influenza pandemic planning, police response to gang violence, the impact of demographic changes, economic security in the Strait of Malacca, a network mindset of critical infrastructure vulnerabilities, supply chain information security, disruption of terrorism and criminal networks, computing in compromised environments, food security, the information warfare of terrorism, and complexity and nontraditional security. All of these themes are addressed in a readable but advanced manner.

The chapter titles clearly indicate the topics to be discussed. Footnotes, tables, and graphs are utilized as appropriate. Each chapter begins with an abstract and concludes with a list of references. Email author contact information is provided as well as brief author affiliation information. However, there is no comprehensive index for the entire book. Additionally, the reader may not know what significant topics are not being addressed in this particular book.

Individuals whose work involves forward thinking about evolving security challenges will want to review this thinking.

Reviewer:  Brad Reid Review #: CR144604 (1610-0750)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy