The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last

virtualbookcase.com score: 3.0 +++--
Vote for this book

Shop for this book
Amazon.com
Amazon.co.uk
Review:
When I was trying to describe this book, a colleague noted that it sounded like (job) security by distraction. The authors have managed to string together a number of points about different aspects of technology, many related to wireless communications and security, but, overall, not providing the reader with much that is relevant to the central topic. Chapter one, entitled "Why is Wireless Different," gives all the appearance of a political polemic. It sounds good, but analysis reveals very little actual meaning in the text. Contiguous statements actually have no relationship to each other. Instead of the promised material about wireless information warfare, chapter two presents a random collection of tidbits from communications and ... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Wireless Security: Models, Threats, and Solutions

Shop for this book
Amazon.com
Amazon.co.uk
Review:
Once upon a time, a group set out to build a language which would allow you to write programs that could be formally verified. Formal analysis and proof can be used to determine that a program will work the way you want it to, and not do something very weird (usually at an inopportune time). First came the attempt to build the Southampton Program Analysis Development Environment (or SPADE) using a subset of the Pascal programming language. When it was determined that Pascal wasn't really suitable, research was directed to Ada, and the SPADE Ada Kernel, or (with a little poetic licence) SPARK, was the result. SPARK can be considered both a subset and extension to Ada, but is best seen as a separate language in its own right. SPARK forb... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of High Integrity Software: The SPARK Approach to Safety and Security

Shop for this book
Amazon.com
Amazon.co.uk
Book description
* SANS (SysAdmin, Audit, Network, Security) has trained and certified more than 156,000 security professionals. * This book is the cost-friendly alternative to the $450 SANS materials and $1200 SANS courses, providing more and better information for $60. * SANS is widely known and well-respected, with sponsors, educators and advisors from prestigious government agencies (FBI), corporations, and universities (Carnegie Mellon) around the world. * A companion CD contains the Boson test engine packed with review questions.
I want to add my review for this book!
Reviews (2) and details of The GSEC Prep Guide : Mastering SANS GIAC Security Essentials

Shop for this book
Amazon.com
Amazon.co.uk
Book description
As wireless device usage increases worldwide, so does the potential for malicious code attacks. In this timely book, a leading national authority on wireless security describes security risks inherent in current wireless technologies and standards, and schools readers in proven security measures they can take to minimize the chance of attacks to their systems. Russell Dean Vines is the coauthor of the bestselling security certification title, The CISSP Prep Guide (0-471-41356-9) Book focuses on identifying and minimizing vulnerabilities by implementing proven security methodologies, and provides readers with a solid working knowledge of wireless technology and Internet-connected mobile devices
I want to add my review for this book!
Reviews (2) and details of Wireless Security Essentials: Defending Mobile Systems from Data Piracy

Shop for this book
Amazon.com
Amazon.co.uk
Book description
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely. The Linux Security Cookbook... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Linux Security Cookbook
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement