Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Information warfare and security
Denning D., Addison-Wesley Longman Ltd., Essex, UK, 1999. Type: Book (9780201433036)
Date Reviewed: Jan 1 1999

With this book, Denning brings to a wider audience the lucid style and insightful analysis that experts in computer security have long appreciated in her work. She has succeeded in her quest to provide a treatment of information security that is accessible and valuable to all who are interested in the subject, no matter how much they already know or how much they need to know.

The book’s scope is use of information in competitive situations, although the emphasis is on information in computers and on such serious conflicts as criminal activity, industrial espionage, and warfare. This broad scope has forced the author to make many difficult choices about inclusion and depth of coverage, but she has made her choices well. Her allocation of only one page to the use of carefully structured queries to make inferences from databases of personal information--a topic on which she has written extensively--is indicative.

The book’s scope must also have presented a challenging organizational problem. While it is far from clear that anyone could have done better, the result here is unsatisfying. Major sections deal with acquiring and protecting information, while subsections treat areas defined by methods of acquisition and defense, arenas of competition, and some topics that are less easily characterized.

Two detailed points merit separate mention. One is that Denning assumes that a system must let at least some individual users have access to a password file--access that at least one system does, and all systems should, restrict to the system’s own programs. The other is that she correctly notes that positions adopted by the United States Department of Defense on the TEMPEST shielding of electromagnetic emanations and on the multilevel security model led to the waste of hundreds of millions of tax dollars. I would add that the department acted in the face of strong and persistent criticism by civilian experts.

While the publisher has served the author well with respect to editing and physical presentation, there are few illustrations; the copious and precise endnotes may leave the curious reader thirsting for explanatory material that could have been incorporated into the notes; and the index is barely adequate.

Reviewer:  S. A. Kurzban Review #: CR122299 (9901-0021)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Social Issues (K.4.2 )
 
 
Administrative Data Processing (J.1 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy