The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last

Shop for this book
I have learned to beware of books with titles like this, which generally indicate a hastily compiled set of old vulnerabilities, benefitting nobody save the author. This work, however, turns out to have a lot of value for those interested in security of software. Although it does not deal with the factors inherent in software that almost ensure problems, chapter one outlines the fact of bugs in software, the relative rate and increasing prevalence, and future developments that may exacerbate the issue. Chapter two provides taxonomies of general types of software problems (distinguishing, for example, between a bug and a flaw), patterns of attack activities (pointing out that most exploits are used in combination), and types of system sc... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Exploiting Software : How to Break Code

Shop for this book
Book description
* Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys * First book to describe international terrorists' cybersecurity tool of choice in an accessible language * Author is a top security consultant for the CIA and provides gripping stories that show how steganography works * Appendix provides tools to help people detect and counteract stenanography
I want to add my review for this book!
Reviews (2) and details of Hiding in Plain Sight : Steganography and the Art of Covert Communication

Shop for this book
Book description
Traditional security toolkits have concentrated mostly on defining a programming interface (API) and left the internals up to individual implementors. This book presents a design for a portable, flexible security architecture based on traditional security models involving a security kernel that controls access to security-relevant objects and attributes based on a configurable security policy. Layered on top of the kernel are various objects that abstract core functionality, such as encryption and digital signature capabilities, certificate management, and secure sessions and data enveloping (email encryption) in a manner that allows them to be easily moved into cryptographic devices, such as smart cards and crypto accelerators for extra pe... Rest of this review on the detail page
I want to add the first review for this book!
Reviews (1) and details of Cryptographic Security Architecture: Design and Verification

Shop for this book
Book description
Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media.
I want to add the first review for this book!
Reviews (1) and details of Investigating Computer-Related Crime, Second Edition

Shop for this book
The existence of this book is a bit odd, particularly in view of the fact that it shares so much material with Stallings' "Cryptography and Network Security." The (clear and structured) preface, however, states that the intent is to provide a practical survey of network security applications and standards, particularly those in widespread use. As with the earlier work, this book is intended to serve both as a textbook for an academic course of study, and as a self-study and reference guide for practicing professionals. There is reduced detail in regard to cryptography. Chapter one is an introduction, and provides a good list of basic concepts and vocabulary. It may not be completely apparent to all readers that the emphasis is on thre... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Network Security Essentials: Applications and Standards
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement