The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last

virtualbookcase.com score: 4.0 ++++-
Vote for this book

Shop for this book
Amazon.co.uk
Review:
The preface states that this book should help people learn about privacy technologies. (The cover refines this: it contains what developers and information technology professionals should know.) Part one examines privacy for everyone. Chapter one is a vague review of privacy. A list of privacy related technologies is in chapter two. There is a brief look, in chapter three, at privacy lawsuits and legislation. Chapter four discusses privacy settings in Windows, including the metadata in Word files. Spam, and anti-spam technologies, are surveyed in chapter five. Privacy invasive technologies are examined in chapter six, concentrating on radio- frequency identity chips. Part two looks at privacy and the organization. Chapter seven s... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Privacy : What Developers and IT Professionals Should Know

Shop for this book
Amazon.co.uk
Book description
Text covers all aspects of role-based access control (RBAC). Explains details of the RBAC model and how to use it to emulate other access control models. Covers the frameworks and tools for administering RBAC. For software developers, security administrators, and students. Includes index and references. DLC: Computers--Access control. Book Info Text covers all aspects of role-based access control (RBAC). Explains details of the RBAC model and how to use it to emulate other access control models. Covers the frameworks and tools for administering RBAC. For software developers, security administrators, and students. Includes index and references. DLC: Computers--Access control.
I want to add my review for this book!
Reviews (2) and details of Role-Based Access Control

Shop for this book
Amazon.co.uk
Review:
The preface (and therefore the book) begins with a definition of a rootkit. The authors proceed to outline their initial interest in the phenomenon, and any security professional who understands the centrality of system internals can begin to see the importance of the work. Chapter one addresses a major selling point (in the blackhat mindset) for rootkits: the evasion of detection. Concentrating on this aspect, the material outlines what a rootkit is, and is not, noting also that the programs need not be limited to illegal activities but do have legitimate uses. Subversion of the core of the operating system is examined in chapter two, although this is limited to the creation of device drivers. (This chapter again raises the issue of ... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Rootkits : Subverting the Windows Kernel

Shop for this book
Amazon.co.uk
Book description
Safe & Secure: Secure Your Home Network, and Protect Your Privacy Online gives you a solid understanding of what is necessary to secure your networked machine. Written in layman's terms, this book describes personal Internet security, with careful consideration given to the reality of the SOHO environment. It covers basic topics such as TCP/IP, cookies, firewalls, virus protection, reviews of current home security software, information regarding public key encryption, and a special section on getting and using Pretty Good Privacy (PGP) personal security software. Information on maintaining individual privacy, managing security audits, and backup and recovery empowers you, and helps protect you from intrusion or other Internet attacks. D... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Safe & Secure: Secure Your Home Network, and Protect Your Privacy Online

Shop for this book
Amazon.co.uk
Book description
(Syngress Publishing) Combines fictional stories with real technology. Provides a glimpse into the creative minds of some of today's best hackers. Softcover. Book Info (Syngress Publishing) Combines fictional stories with real technology. Provides a glimpse into the creative minds of some of today's best hackers. Softcover. From the Publisher In the real world, hackers go after the "low-hanging fruit." They take the least risk and go for the greatest reward. They often act alone or in small groups. They don’t have government funding or belong to world criminal organizations. What they do have is spare time and a lot of curiosity, and believe me, hacking takes a lot of time. Some of the best hackers spend months working on one exploit. ... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Stealing the Network: How to Own the Box
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement