Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Information security planning: a practical approach (2nd ed.)
Lincke S., Springer International Publishing, Cham, Switzerland, 2024. 445 pp. Type: Book (9783031431173)
Date Reviewed: Apr 3 2024

Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security awareness, strategic/tactical security planning, and national regulations and ethics. It was delightful to read such a book.

The book has many strengths. First, it covers the whole perspective of information security planning, from user education and management to regulations and techniques. Second, the author uses many exciting cases to explain the motivations and methods behind those security aspects. Readers can easily understand the functionality of those planning methods. Finally, unlike traditional information security teaching books, it includes many real-world cases from journals and newspapers that support the presented ideology.

The book also has some weaknesses. See, for example, Section 1.4’s perhaps technically controversial claim: “If a password is 12 alphabetical characters long, it can take up to 96 years, or as long as 500 years if you also include numbers in your password.” Actually, if the password is alphabetical only, it may not require such a long time to brute-force it with today’s graphics processing unit (GPU) power. Many technical controversies can be found in other parts of the book, too. The quality of the figures could also be improved. Some of them are quite simple and crude, for example, Figure 4.3.

Overall, it is a useful book for beginners in the field. It can also be helpful for managers and engineers to refine their information security planning.

Reviewer:  Zheng Gong Review #: CR147736
Bookmark and Share
  Editor Recommended
 
 
Security and Protection (K.6.5 )
 
 
Information Browsers (H.4.3 ... )
 
 
Information Networks (H.3.4 ... )
 
 
Security (K.6.m ... )
 
 
Security (K.4.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy