Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Information security : protecting the global enterprise
Pipkin D., Prentice-Hall, Inc., Upper Saddle River, NJ, 2000. 364 pp. Type: Book (9780130173232)
Date Reviewed: Apr 1 2000

Pipkin discusses almost every conceivable aspect of information security, all the way from the changing environment in which organizations now find themselves, through all aspects of business analysis, policies and procedures, implementation, incident handling, and postmortems, right through to the prosecution of wrongdoers. Everything is treated carefully, at a useful level that is easy for any computer professional to understand.

What Pipkin does not do is, forgivably, go into detail on any point or, less forgivably, say anything about where readers can find more detail. There is no bibliography, and there are no useful references. This book is an excellent starting point, but no more.

A few lacunae are hard to understand in a book with the word “global” in its subtitle and “Legal . . . implications” mentioned prominently on its cover. There is no mention at all of the data protection laws that exist in every industrialized nation except the United States. The book does not discuss such important legal questions as how organizations’ overclassification of data, or failure to warn electronic trespassers, may affect their legal standing when they sue employees for failing to protect or stealing data, or outsiders for penetrating or misusing their systems.

The book is well written, presented in a reader-friendly format, and relatively competently edited. The meager index is adequate for a book organized as well as this one is.

Reviewer:  S. A. Kurzban Review #: CR124849
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy