Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Miscellaneous (K.6.m) > Security (K.6.m...)  
  1-10 of 13 Reviews about "Security (K.6.m...)": Date Reviewed
   IT security controls: a guide to corporate standards and frameworks
Viegas V., Kuyucu O., Apress, New York, NY, 2022. 376 pp.  Type: Book (978-1-484277-98-0)

As a consequence of the growth in criminal monetization of cybersecurity attacks and increased legislated compliance requirements, not to mention plain old business risk management, information and communications technology (ICT) systems security ...

Nov 14 2022
  Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Patterson W., Winston-Proctor C., CRC Press, USA, 2019. 261 pp.  Type: Book (978-1-138617-78-0)

It is a well-known fact that the weakest element of all cryptographic systems is a human being. No matter how smart mathematical methods are embedded to protect our network and computer infrastructures, nor how precisely we design the ...

Jun 21 2022
  Engineering trustworthy systems: a principled approach to cybersecurity
Saydjari O. Communications of the ACM 62(6): 63-69, 2019.  Type: Article

In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who w...

Nov 4 2019
  Application of big data for national security: a practitioner’s guide to emerging technologies
Akhgar B., Saathoff G., Arabnia H., Hill R., Staniforth A., Bayerl P., Butterworth-Heinemann, Waltham, MA, 2015. 316 pp.  Type: Book (978-0-128019-67-2)

It is a pleasure to review a compilation of current works that address diverse perspectives of the timely topic of big data analytics for national security. The work consists of 18 chapters organized by topic areas into four sections.<...

Sep 8 2016
  Identity authentication based on keystroke latencies
Joyce R., Gupta G. Communications of the ACM 33(2): 168-176, 1990.  Type: Article

The authors present a thorough and useful description of their work on the use of keystroke latencies (the intervals between successive keystrokes) to authenticate the identity of a computer user. Their approach requires each user to e...

Sep 1 1990
  Auditing computer security: a manual with case studies
Vallabhaneni S., John Wiley & Sons, Inc., New York, NY, 1989.  Type: Book (9780471626046)

As the author indicates in his preface, this book provides a great deal of useful information for various types of “experienced and novice auditors.” Despite the abundant white space in this large-format book, it is...

Jul 1 1990
  The cuckoo’s egg: tracking a spy through the maze of computer espionage
Stoll C., Doubleday, New York, NY, 1989.  Type: Book (9789780385249461)

All computer professionals interested in some realistic examples of systems security should read astronomer-cum-wizard Clifford Stoll’s book about his pursuit of the person he once characterized as the “wily hacker&...

May 1 1990
  Security in computing
Pfleeger C., Prentice-Hall, Inc., Upper Saddle River, NJ, 1989.  Type: Book (9780137989430)

Pfleeger’s book is packaged as a university text. It opens with three excellent chapters that cover the basic mathematics of encryption, decryption, and associated practices. A brief introduction to computer security, and a d...

Aug 1 1989
  Building a secure computer system
Gasser M., Van Nostrand Reinhold Co., New York, NY, 1988.  Type: Book (9780442230227)

Whenever a specific domain acquires some maturity, a representative monograph appears that marks this stage. This reference work of technical solutions to computer security problems accomplishes such a task. The topics it covers includ...

Aug 1 1989
  Designing information systems security
Baskerville R., John Wiley & Sons, Inc., New York, NY, 1988.  Type: Book (9780471917724)

Fledgling managers who have just learned that they are responsible for the security of their organizations’ data may find this book very useful. Its 177 pages of text and 3 appendices provide overviews of concepts, typical co...

May 1 1989
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy