Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5)  
 
Options:
 
  1-10 of 457 Reviews about "Security and Protection (K.6.5)": Date Reviewed
   Information security planning: a practical approach (2nd ed.)
Lincke S., Springer International Publishing, Cham, Switzerland, 2024. 445 pp.  Type: Book (9783031431173)

Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security aware...

Apr 3 2024
  Cyber malware: offensive and defensive systems
Akhgar B., Almomani I., Maglaras L., Ferrag M., Ayres N., Springer International Publishing, Cham, Switzerland, 2023. 280 pp.  Type: Book (9783031349683)

Cyber malware: offensive and defensive systems provides a thorough examination of the constantly changing realm of cyber threats and the defense mechanisms created to fend them off. For those working in the field of cybersecurity, this book...

Feb 21 2024
  Security chaos engineering: sustaining resilience in software and systems
Shortridge K., Rinehart A., O’Reilly, Sebastopol, CA, 2023. 428 pp.  Type: Book (9781098113827)

The remarkable progress in data communications and networking necessitates new behaviors, principles, and disciplines concerning security. In addition to security techniques like encryption, authentication, established demilitarized zones (DMZs), ...

Feb 20 2024
   Eight reasons to prioritize brain-computer interface cybersecurity
López Bernal S., Huertas Celdrán A., Martínez Pérez G. Communications of the ACM 66(4): 68-78, 2023.  Type: Article

In this thought-provoking article, the authors astutely highlight the significance of prioritizing brain-computer interface (BCI) cybersecurity. Their comprehensive work sheds light on the emerging field of BCI and the critical need to protect the...

Sep 29 2023
   Zero trust architecture
Green-Ortiz C., Fowler B., Houck D., Hensel H., Lloyd P., McDonald A., Frazier J., Cisco Press, Indianapolis, IN, 2023. 336 pp.  Type: Book (137899734)

“Don’t trust anyone” is common advice in many spy novels and movies. Good advice as well for modern Internet-connected network infrastructures, where there are no longer demarcations between internal-only and external access poin...

Sep 25 2023
  Computer security fundamentals (5th ed.)
Easttom C., Pearson, Hoboken, NJ, 2023. 512 pp.  Type: Book (0137984756)

Computer security fundamentals, by Chuck Easttom, is a compilation of concepts and tools used in computer security. The book is composed of 15 chapters that can be gathered into four distinct parts....

Jun 7 2023
   Big breaches: cybersecurity lessons for everyone
Daswani N., Elbayadi M., Apress, New York, NY, 2021. 476 pp.  Type: Book (978-1-484266-54-0)

This large work begins with an introductory preface that provides historical perspective on cybercriminals and introduces the authors and the basic tenets of the book. The work is divided into two broad parts: the first gives detailed descriptions...

Mar 31 2023
   Phishing and communication channels: a guide to identifying and mitigating phishing attacks
Sonowal G., Apress, New York, NY, 2022. 240 pp.  Type: Book (978-1-484277-43-0)

It is not far-fetched to say that most (if not all) CR readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individ...

Jan 12 2023
   The modern security operations center
Muniz J., Pearson, Hoboken, NJ, 2021. 752 pp.  Type: Book (978-1-356198-58-0)

Cybersecurity involves carrying out complete and continuous activities to investigate and eliminate threats. As a recommended solution, a security operations center (SOC) allows an organization to achieve a level of security by monitor...

Jun 24 2022
  Cyber Security: Power and Technology
Lehto M., Neittaanmaki P., Springer, Switzerland, 2018. 288 pp.  Type: Book (978-3-319753-06-5)

The book is split into two parts: “Cyber Power” (110 pages) and “Cyber Security Technology” (160 pages). They are very different in nature, likely appealing to two separate audiences....

Feb 22 2022
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy