Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Spyware and adware
Aycock J., Springer Publishing Company, Incorporated, New York, NY, 2010. 200 pp. Type: Book (9780387777405)
Date Reviewed: Aug 19 2011

[CR has previously published a review of this book (see Review CR138977). The author of the book has written a rebuttal to the review.]

AUTHOR’S REBUTTAL

I agree with Lecarme that the book is overpriced. Unfortunately, I have no say in that; it’s up to the publisher. The chapter notes were actually marked in the margin, so one could easily identify when a note existed, but these got chopped off without any warning when the book was published. Again, I agree with Lecarme--they are difficult to use in their current form.

I will, however, disagree with him about the programming examples and whether readers would be able to build (anti-)spyware. My reasoning for avoiding code examples is given in part in the preface, and there are clear issues involved with supplying malicious code. Also, the students I normally teach are already skilled programmers. Once the ideas and mechanisms are explained, that’s sufficient for them to implement something.

Reviewer:  John Aycock Review #: CR139382 (1201-0050)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy