The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last score: 4.0 ++++-
Vote for this book

Shop for this book
The Certified Information Systems Security Professional (CISSP) rating is difficult to earn and rare in the marketplace, which means you're a valuable commodity if you've proven your skills by passing the exam. The CISSP Prep Guide, one of only a handful of books on its subject, does a good job of giving readers a feel for the scope of the test and the style of its questions. It's ideal for use either as a preliminary survey of the CISSP subject areas (the test's publisher and the authors of this book call them "domains") for relative newcomers to computer security, or as a pure study guide to help more experienced professionals zero in on the weak spots in their knowledge. Don't expect to do well on the CISSP exam having only read this boo... Rest of this review on the detail page
(Review by
I want to add my review for this book!
Reviews (3) and details of The CISSP Prep Guide: Mastering the Ten Domains of Computer Security

Shop for this book
This is a broad but very general overview of modern communications security theories and standards. Chapters cover fundamental concepts, layered architectures, cryptography, authentication, access control, integrity, non-repudiation, architecture, standards, protocols and management. Although stated to be a tutorial and reference, the book is written like an academic textbook. An advantage of this is a large bibliography. The book has little or no direct practical application. It does provide a solid vocabulary and knowledge of related standards. (There is, however, no mention of either Clipper or PGP.) copyright Robert M. Slade, 1994
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Computer Communications Security: Principles, Standard Protocols and Techniques score: 3.0 +++--
Vote for this book

Shop for this book
Book description
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool.The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Handbook of Computer Crime Investigation: Forensic Tools & Technology

Shop for this book
This book occupies a unique place in the literature of computer forensics. Most works in the field, such as Kruse and Heiser's "Computer Forensics" (see reviews), concentrate on documentation of the investigation with a view to presentation in court. The actual mechanics of data recovery tend to be left to commercial tools. Caloyannides demonstrates how to delve into corners of the computer in order to actually get the data out. At the same time, this work is inconsistent, on at least two levels. The perspective flips back and forth between forensics and privacy, alternately emphasizing how to find evidence, and how to hide evidence. The technology involved is the same, but the shifts in viewpoint ... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Computer Forensics and Privacy (Artech House Computer Security Series)

Shop for this book
As a guide for law enforcement personnel and systems managers, this provides a good overview and introduction to computer crime and the actions to take against it. Touching on crime, prevention and prosecution, the book is practical and helpful to those needing to get a quick handle on the problem. It is, however, easily evident that the authors are law enforcement, rather than systems, professionals. Those expecting a technical discussion, from the O'Reilly imprimatur, will be disappointed. The book started life as an official FBI training manual. The explanations and concepts are elementary-- and are intended to be so. Thus, while it might be possible to argue (rather weakly) for the definitions of viruses, worms and other malwar... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Computer Crime: A Crimefighter's Handbook (Computer Security)
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement