Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Neumann, William
University of Arizona
Tucson, Arizona
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 45 reviews

   
  Data protection and privacy: (in)visibilities and infrastructures
Leenes R., van Brakel R., Gutwirth S., De Hert P., Springer International Publishing, New York, NY, 2017. 295 pp.  Type: Book (978-3-319507-95-8)

This work was selected from materials presented at the 9th International Conference on Computers, Privacy, and Data Protection, held in Brussels in January 2016. The ten chapters were selected from the 80 panels and 343 speakers who pr...

Oct 25 2017  
  Ten laws for security
Diehl E., Springer International Publishing, New York, NY, 2016. 281 pp.  Type: Book (978-3-319426-39-6)

In contrast to many security texts that are focused on interpreting the checklists included in one of the many published security standards (for example, ISO 27002:2005) to assess and improve an organization’s information sec...

Jun 19 2017  
  10 don’ts on your digital devices: the non-techie’s survival guide to cyber security and privacy
Rzeszut E., Bachrach D., Apress, New York, NY, 2014. 180 pp.  Type: Book (978-1-484203-68-2)

This book is an introduction to cyber security and privacy for nontechnical readers. Increasingly, the media has shown us examples of highly connected individuals who have focused more on the features of the application than the possib...

Mar 23 2015  
  Total information risk management: maximizing the value of data and information assets
Borek A., Parlikad A., Webb J., Woodall P., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2013. 316 pp.  Type: Book (978-0-124055-47-6)

The concept of total information risk management (TIRM) is based on using the principles of risk management in the governance of data assets. As information has become a critical asset for most companies, managing data has primarily us...

Feb 26 2014  
   Introduction to information security: a strategic-based approach
Shimeall T., Spring J., Syngress Publishing, Waltham, MA, 2014. 382 pp.  Type: Book (978-1-597499-69-9)

In contrast to most introductory texts in information security, this book really does fulfill the promise of its subtitle. Rather than explain information security from the perspective of one of the many standards, the authors use a bu...

Feb 25 2014  
   FISMA and the risk management framework: the new practice of federal cyber security
Gantz S., Philpott D., Syngress Publishing, Waltham, MA, 2012. 584 pp.  Type: Book (978-1-597496-41-4)

This well-written book is primarily intended to assist professionals responsible for risk management programs in executive agencies that are subject to the Federal Information Security Management Act (FISMA). However, the organization ...

Sep 6 2013  
   Security battleground: an executive field manual
Fey M., Kenyon B., Intel Press, Santa Clara, CA, 2012. 264 pp.  Type: Book (978-1-934053-46-1)

Written by a team of senior executives at McAfee, this book is targeted at executives who are responsible for protecting their enterprises from business risks. These individuals typically do not serve as chief information security offi...

Jun 4 2013  
   Computer security literacy: staying safe in a digital world
Jacobson D., Idziorek J., Chapman & Hall/CRC, Boca Raton, FL, 2013. 368 pp.  Type: Book (978-1-439856-18-5)

Rather than focus on the technical methods associated with computer security, this book approaches the topic from the user’s perspective. As the authors note, the actions taken and decisions made by end users are the weakest ...

Mar 26 2013  
  Guide to computer network security
Kizza J., Springer Publishing Company, Incorporated, 2008. 576 pp.  Type: Book (9781848009165)

As noted in the preface, computer security is a rapidly changing field; keeping abreast of these changes will be challenging at best. This book focuses on educating readers on the security problems that are likely to be encountered. It...

May 6 2009  
  SafetyNET -- designing and implementing a technology support program for students
Hartranft J., Longenecker V.  User services (Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services, Edmonton, Alberta, Canada, Nov 5-8, 2006) 141-142, 2006.  Type: Proceedings

SafetyNET is a program developed at Millersville University to address many of the common problems associated with viruses and spyware on students’ personal computers. The Blaster and Welchia virus attacks in 2002 reinforced ...

Jan 30 2007  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy