Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Designing information systems security
Baskerville R., John Wiley & Sons, Inc., New York, NY, 1988. Type: Book (9780471917724)
Date Reviewed: May 1 1989

Fledgling managers who have just learned that they are responsible for the security of their organizations’ data may find this book very useful. Its 177 pages of text and 3 appendices provide overviews of concepts, typical controls, risk-analysis procedures, and human factors concerns, but do not investigate any subject in depth. The preface claims that the book is appropriate for the “systems analyst/designer” as well as the “computing professional,” but it will provide these individuals with only an acquaintance with the relevant concerns.

While the text is sufficiently up-to-date to define the term “virus program” with a precision that is regrettably rare in today’s nonacademic literature, it is not recent enough to contain any material that will help combat either the viruses or the worms that have been making headlines. Readers will have to seek such material, and indeed much else that they would need to fulfill any substantial educational or training requirements, in newer and more thorough sources.

Reviewer:  S. A. Kurzban Review #: CR112964
Bookmark and Share
 
Security (K.6.m ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
An intrusion-detection model
Denning D. IEEE Transactions on Software Engineering SE-13(2): 222-232, 1987. Type: Article
Oct 1 1987
Data security and confidentiality in Europe
Chamoux J. Computers and Security 4(3): 207-210, 1985. Type: Article
Feb 1 1986
Security in computing
Pfleeger C., Prentice-Hall, Inc., Upper Saddle River, NJ, 1989. Type: Book (9780137989430)
Aug 1 1989
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy