Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Stagg, Vernon
Deakin University
Waurn Ponds, Australia
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 10 reviews

   
   Networks, security and complexity: the role of public policy in critical infrastructure protection
Gorman S., Edward Elgar Publishing, Incorporated, 2005. 153 pp.  Type: Book (9781843769521)

In 2003, The Washington Post published an article on Sean Gorman’s thesis, which mapped out the telecommunications fiber optic network in the US. This thesis caused a stir within government and industry over its potent...

Feb 10 2006  
   Homeland security techniques and technologies (Networking Series)
Mena J., Charles River Media, Inc., Rockland, MA, 2004.  Type: Book (9781584503286)

The security functions of government services, in the US and many other countries, have undergone many changes, particularly following the September 11, 2001 terrorist attacks. One of the key changes has been the collection, analysis, ...

Mar 17 2005  
  Bioterrorism: mathematical modeling applications in homeland security
Banks T., Castillo-Chavez C., Society for Industrial & Applied Mathematics, 2003. 240 pp.  Type: Book (9780898715491)

I accepted this review assignment in the anticipation of gaining a better understanding of the bioterrorism threat. It was, however, with some trepidation that I began reading the book, not because of its subject, but rather because of...

Jul 21 2004  
   Investigator’s guide to steganography
Kipper G., CRC Press, Inc., Boca Raton, FL, 2003. 350 pp.  Type: Book (9780849324338)

Steganography is a method of hidden communication, where the message is in the open, but goes undetected because the very existence of the message is secret....

May 18 2004  
   Beyond fear: thinking sensibly about security in an uncertain world
Schneier B., Springer-Verlag New York, Inc., Secaucus, NJ, 2003. 256 pp.  Type: Book (9780387026206), Reviews: (1 of 2)

Having been a long time reader of the Crypto-Gram column, and well aware of Schneier’s knowledge and expertise in the information security field, it was with some eagerness that I received a copy of his latest book, . Needles...

Dec 1 2003  
   The art of deception: controlling the human element of security
Mitnick K., Simon W., John Wiley & Sons, Inc., New York, NY, 2002. 304 pp.  Type: Book (9780471237129)

Many books on information technology (IT) security are available, covering a wide range of issues at both the technical and managerial levels. While these books do recognize the existence of the human and social elements of security, v...

Oct 7 2003  
   Information warfare: how businesses, governments, and others achieve global objectives and attain competitive advantages
Kovacich G., Auerbach Publications, Boston, MA, 2002. 352 pp.  Type: Book (9780849311147)

This is an informative, well researched, and entertaining book. Written by three well-known information security professionals, it presents a detailed analysis of information warfare (IW) and its impact on governments and businesses. ...

Mar 21 2003  
  Security transformation: digital defense strategies to protect your company’s reputation and market share
McCarthy M., McGraw-Hill, Inc., New York, NY, 2002.  Type: Book (9781401499426)

The big picture of enterprise security architecture is examined in this book. It is written in a simple easy-to-read style, and although some technical details are discussed, it is aimed primarily at upper management or those with min...

Dec 19 2002  
  Developing trust: online privacy and security
Curtin M., APress, LP, Berkeley, CA, 2002. 282 pp.  Type: Book (9781893115729), Reviews: (2 of 2)

The need for online security and privacy has become a key issue for society, as we increasingly use and grow reliant on information and information systems. Identity theft, improper or illegal use of personal information, and the unwi...

Nov 14 2002  
  Secure communication: applications and management
Sutton R., John Wiley & Sons, Inc., New York, NY, 2002. 322 pp.  Type: Book (9780471499046)

As the author states, this book is a study of how to apply cryptography to secure telecommunications. It is aimed primarily at readers with some cryptographic and electronics knowledge, and provides a variety of measures and technique...

Aug 13 2002  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy