The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last

Shop for this book
The introduction states that while the book does cover foundational encryption concepts, it is primarily intended to explain the appropriate use of the PGP (Pretty Good Privacy) and GPG tools. This preamble also provides a history and description of PGP, OpenPGP, and GnuPG. The rudimentary outline is good, but does have some errors: an ITAR (International Traffic in Arms Regulations) offence would be a criminal (rather than civil) matter so the US government never did launch a lawsuit against software author Phil Zimmermann (although other lawsuits were launched surrounding the program), and the program was produced before the book of the source code was published. (Lucas also retails the myth that the NSA has a secret computer that can... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (2) and details of PGP & GPG: Email for the Practical Paranoid score: 2.0 ++---
Vote for this book

Shop for this book
Some forensics books provide a CD-ROM with (usually demo) versions of computer forensic software. This one provides a DVD of log and other forensic data, and points the reader to sites for open source tools that can be used to explore it. Six "case studies," of fictitious situations, have been provided, and are referred to at different times and places within the book. Part one ostensibly looks at response to an incident in real time. Chapter one outlines tools that can be used for data capture and analysis of various types on a Windows computer (associated with the first "case"). There is rather limited explanation of the choices and decisions involved (the authors make frequent mention that topics are "beyond the scope" of this book... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Real Digital Forensics : Computer Security and Incident Response

Shop for this book
Book description
An introduction to the key tools and technologies used to secure network access * Examine common security vulnerabilities and the defenses used to protect network resources * Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates * Learn how to design, adopt, and enforce security policies * Evaluate the nuances of secure network design * Secure HTTP traffic by hardening operating systems, servers, and browsers * Protect routers through administrative access policies and services * Understand what firewalls do and how to implement them to maximum effect * Inspect and monitor network activity with IDS * Utilize VPNs for secure remote access * Learn about PKI technologies * Examine secure... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Network Security Fundamentals (Cisco Press Fundamentals Series) score: 3.5 ++++-
Vote for this book

Shop for this book
Book description
A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols). * Details what the risks on the internet are and how cryptography can help * Includes a chapter on interception which is unique amongst competing books in this field * Explains Public Key Infrastructures (PKIs) - currently the most important issue when using cryptography in a large organisation * Includes up-to-date referencing of peop... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Cryptography and Public Key Infrastructure on the Internet

Shop for this book
Book description
* Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003 * CISM is business-oriented and intended for the individual who must manage, design, oversee, and assess an enterprise's information security * Essential reading for those who are cramming for this new test and need an authoritative study guide * Many out-of-work IT professionals are seeking security management certification as a vehicle to re-employment * CD-ROM includes a Boson-powered test engine with all the questions and answers from the book
I want to add my review for this book!
Reviews (2) and details of The CISM Prep Guide : Mastering the Five Domains of Information Security Management
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement