The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last


Shop for this book
Amazon.com
Amazon.co.uk
Book description
This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization. All chapters are completely updated with the focus on practical methods that the reader can put to use in managing an effective security department.The Fourth Edition covers current computer applications that can help in the administrative, managerial, and supervisory aspects of the security function. In addition, two new chapters address employee management in detail. The first, Lifestyle Management for Managers, will discuss motivation at work: the how, when, where, what and why of se... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Effective Security Management, Fourth Edition (Effective Security Management)

Shop for this book
Amazon.com
Amazon.co.uk
Review:
Toigo's first edition outshone almost all later DRP (Disaster Recovery Planning) and BCP (Business Continuity Planning) works. This edition vastly expands the resources and thinking on the topic. In the preface, Toigo examines the question of whether people will see this new edition as simply an exercise in opportunistic marketing, using the events of September 11, 2001 to promote a fresh work. He concludes that changes in technology do justify another edition. In addition, the new pieces giving post-9/11 perspectives from various parties (generally vendors) do provide some additional insights. The leading foreword, a first-hand account of the evacuation of one of the World Trade Center towers, offers interesting observations such as ... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Disaster Recovery Planning: Strategies for Protecting Critical Information Assets

Shop for this book
Amazon.com
Amazon.co.uk
Book description
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security. After examining how a worm is constructed and how its major life cycle steps are implemented, the book scrutinizes targets that worms have attacked over the years, and the likely targets of the immediate future. Moreover... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Defense and Detection Strategies against Internet Worms

Shop for this book
Amazon.com
Amazon.co.uk
Book description
Discover how to make biometrics -- the technology involving scanning and analyzing unique body characteristics and matching them against information stored in a database -- a part of your overall security plan with this hands-on guide. Includes deployment scenarios, cost analysis, privacy issues, and much more.
I want to add my review for this book!
Reviews (2) and details of Biometrics

Shop for this book
Amazon.com
Amazon.co.uk
Book description
Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics li... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Kerberos : The Definitive Guide
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement