|
|
|
|
Choo, KKR
University of South Australia
Mawson Lakes campus, Adelaide, SA, Australia
|
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 20
reviews
|
|
|
|
|
|
|
|
CSA guide to cloud computing: implementing cloud privacy and security Samani R., Reavis J., Honan B., Syngress Publishing, Waltham, MA, 2014. 236 pp. Type: Book (978-0-124201-25-5), Reviews: (2 of 2)
The Cloud Security Alliance (CSA) is the leading not-for-profit organization in cloud security, which is evident in the body of research they have produced over the years....
|
Jun 20 2016 |
|
|
|
|
|
|
Malware forensics field guide for Linux systems: digital forensics field guides Malin C., Casey E., Aquilina J., Syngress Publishing, Waltham, MA, 2013. 624 pp. Type: Book (978-1-597494-70-0)
Digital forensics remains an under-researched area, partly due to the interdisciplinary challenges specific to this research. The authors draw on their unique combination of experiences in law enforcement investigation (Malin, FBI Cybe...
|
Oct 8 2014 |
|
|
|
|
|
|
Computational intelligence in digital forensics: forensic investigation and applications Muda A., Choo Y., Abraham A., Srihari S., Springer Publishing Company, Incorporated, New York, NY, 2014. 453 pp. Type: Book (978-3-319058-84-9)
This edited book introduces the reader to various aspects of digital forensics and digital investigation techniques....
|
Jul 23 2014 |
|
|
|
|
|
|
Mobile user experience: patterns to make sense of it all Mendoza A., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2013. 248 pp. Type: Book (978-0-124095-14-4)
This is an interesting book, and certainly not what I was expecting when I volunteered to review it....
|
Jun 17 2014 |
|
|
|
|
|
|
Wireless networks and security: issues, challenges and research trends Khan S., Pathan A., Springer Publishing Company, Incorporated, Berlin, Germany, 2013. 520 pp. Type: Book (978-3-642361-68-5)
This edited collection provides a timely summary of recent research efforts in the wireless networks area, including a broad understanding of the issues and challenges and a discussion of security....
|
Sep 16 2013 |
|
|
|
|
|
|
Cooperative cellular wireless networks Hossain E., Kim D., Bhargava V., Cambridge University Press, New York, NY, 2011. 542 pp. Type: Book (978-0-521767-12-5)
Covering an area of current research interest, this book was a very interesting read for me. The preface does a good job of introducing the reader to the book, which consists of five main parts. The division into parts can be very usef...
|
Nov 1 2011 |
|
|
|
|
|
|
Spyware and adware Aycock J., Springer Publishing Company, Incorporated, New York, NY, 2010. 200 pp. Type: Book (9780387777405), Reviews: (1 of 4)
At nine short chapters, this book is written in a simplistic manner. Chapter 1 provides a brief yet sufficient review of the history and evolution of spyware and adware. Chapters 2 and 3 illustrate how spyware and adware can be install...
|
Mar 2 2011 |
|
|
|
|
|
|
Handbook of Internet crime Jewkes Y., Yar M., Willan Publishing (UK), Oxford, UK, 2010. 654 pp. Type: Book (978-1-843925-24-8), Reviews: (1 of 2)
This timely addition to the discussion of online crime is for readers who are new to the topic and want an easy-to-read introduction....
|
Dec 23 2010 |
|
|
|
|
|
|
Foundations of security analysis and design V: FOSAD 2007/2008/2009 tutorial lectures (LNCS 5705) Aldini A., Barthe G., Gorrieri R. Springer-Verlag, New York, NY, 2009. Type: Divisible Book
This is a compilation of selected tutorial papers from the 2007 to 2009 Foundations of Security Analysis and Design (FOSAD) schools. In the first paper, Escobar, Meadows, and Meseguer describe the Maude-NRL protocol analyzer (Maude-NPA...
|
Mar 10 2010 |
|
|
|
|
|
|
Global initiatives to secure cyberspace: an emerging landscape Portnoy M., Goodman S., Springer Publishing Company, Incorporated, New York, NY, 2008. 166 pp. Type: Book (9780387097633)
Cybercrime is essentially a transnational crime, with a modus operandi that exploits inter-state differences in the capacity to respond to such crimes. This transnational character provides cybercriminals, especially organized crime, w...
|
Jun 18 2009 |
|
|
|
|
|
|
|
|
|
|
|