|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 10
reviews
|
|
|
|
|
|
|
|
Networks, security and complexity: the role of public policy in critical infrastructure protection Gorman S., Edward Elgar Publishing, Incorporated, 2005. 153 pp. Type: Book (9781843769521)
In 2003, The Washington Post published an article on Sean Gorman’s thesis, which mapped out the telecommunications fiber optic network in the US. This thesis caused a stir within government and industry over its potent...
|
Feb 10 2006 |
|
|
|
|
|
|
Homeland security techniques and technologies (Networking Series) Mena J., Charles River Media, Inc., Rockland, MA, 2004. Type: Book (9781584503286)
The security functions of government services, in the US and many other countries, have undergone many changes, particularly following the September 11, 2001 terrorist attacks. One of the key changes has been the collection, analysis, ...
|
Mar 17 2005 |
|
|
|
|
|
|
Bioterrorism: mathematical modeling applications in homeland security Banks T., Castillo-Chavez C., Society for Industrial & Applied Mathematics, 2003. 240 pp. Type: Book (9780898715491)
I accepted this review assignment in the anticipation of gaining a better understanding of the bioterrorism threat. It was, however, with some trepidation that I began reading the book, not because of its subject, but rather because of...
|
Jul 21 2004 |
|
|
|
|
|
|
Investigator’s guide to steganography Kipper G., CRC Press, Inc., Boca Raton, FL, 2003. 350 pp. Type: Book (9780849324338)
Steganography is a method of hidden communication, where the message is in the open, but goes undetected because the very existence of the message is secret....
|
May 18 2004 |
|
|
|
|
|
|
Beyond fear: thinking sensibly about security in an uncertain world Schneier B., Springer-Verlag New York, Inc., Secaucus, NJ, 2003. 256 pp. Type: Book (9780387026206), Reviews: (1 of 2)
Having been a long time reader of the Crypto-Gram column, and well aware of Schneier’s knowledge and expertise in the information security field, it was with some eagerness that I received a copy of his latest book, . Needles...
|
Dec 1 2003 |
|
|
|
|
|
|
The art of deception: controlling the human element of security Mitnick K., Simon W., John Wiley & Sons, Inc., New York, NY, 2002. 304 pp. Type: Book (9780471237129)
Many books on information technology (IT) security are available, covering a wide range of issues at both the technical and managerial levels. While these books do recognize the existence of the human and social elements of security, v...
|
Oct 7 2003 |
|
|
|
|
|
|
Information warfare: how businesses, governments, and others achieve global objectives and attain competitive advantages Kovacich G., Auerbach Publications, Boston, MA, 2002. 352 pp. Type: Book (9780849311147)
This is an informative, well researched, and entertaining book. Written by three well-known information security professionals, it presents a detailed analysis of information warfare (IW) and its impact on governments and businesses. ...
|
Mar 21 2003 |
|
|
|
|
|
|
Security transformation: digital defense strategies to protect your company’s reputation and market share McCarthy M., McGraw-Hill, Inc., New York, NY, 2002. Type: Book (9781401499426)
The big picture of enterprise security architecture is examined in this book. It is written in a simple easy-to-read style, and although some technical details are discussed, it is aimed primarily at upper management or those with min...
|
Dec 19 2002 |
|
|
|
|
|
|
Developing trust: online privacy and security Curtin M., APress, LP, Berkeley, CA, 2002. 282 pp. Type: Book (9781893115729), Reviews: (2 of 2)
The need for online security and privacy has become a key issue for society, as we increasingly use and grow reliant on information and information systems. Identity theft, improper or illegal use of personal information, and the unwi...
|
Nov 14 2002 |
|
|
|
|
|
|
Secure communication: applications and management Sutton R., John Wiley & Sons, Inc., New York, NY, 2002. 322 pp. Type: Book (9780471499046)
As the author states, this book is a study of how to apply cryptography to secure telecommunications. It is aimed primarily at readers with some cryptographic and electronics knowledge, and provides a variety of measures and technique...
|
Aug 13 2002 |
|
|
|
|
|
|
|
|
|
|
|