Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
White-hat security arsenal : tackling the threats
Rubin A., Addison-Wesley Longman Ltd., Essex, UK, 2001. 330 pp. Type: Book (9780201711141)
Date Reviewed: Oct 1 2001

Rubin has written a superb book on the topic of security, as the book delineates it. To a well-chosen and very useful level of detail, he tells system administrators, IT professionals, and end users all they need to know about attacks on their systems and data, and about defenses against those attacks. Academics and those needing more detail will easily find the information they need in the sources keyed to each segment of the text.

The book’s principal sections deal with worms and viruses, data storage, telecommunications, protection of networks, and commerce and privacy. Each section contains well-written and appropriately comprehensive overviews and descriptions of attacks and defenses, as well as one or more case studies.

Although a Computer Security Institute survey described on page five attributes over 20 percent of all computer-related loss to financial fraud, the book deals only with protection against unauthorized individuals. There is no mention of defenses that address the risks posed by authorized users of systems: auditing controls and principles such as least privilege and separation of duties, for example.

The book’s organization, accuracy, typography, illustrations, editing, bibliography, and index serve as a model of how to make a book easy to read and of maximum usefulness. It will be of value to anyone concerned about the protection of computers from attack by outsiders.

Reviewer:  S. A. Kurzban Review #: CR125472 (0110-0373)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Security (K.4.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy