Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure computing
Summers R., McGraw-Hill, Inc., Hightstown, NJ, 1997. Type: Book (9780070694194)
Date Reviewed: Sep 1 1997

What a nice book! Summers undertook an ambitious project aimed at pulling together all of the relevant aspects of secure computing, and she has succeeded admirably. She has aimed the book at computer professionals, management, and students, and has managed to produce a book with something for all of them. I was especially impressed with her handling of any number of arcane topics, from the theoretical foundations of modern computer security to the theoretical foundations of modern cryptography.

According to the preface,

The book has four parts; Part 1 describes the societal and technological forces that affect computer security. It introduces important threats and lays a theoretical foundation. Part 2 describes technical methods: cryptography, secure design and development, protection mechanisms, operating system services and database security. Part 3 is devoted to the security of networks and distributed systems. It deals with local area networks and Internet security. Part 4 gives practical information about management of security programs, administrative controls, physical security, risk analysis and auditing.

Each part consists of several chapters, and each chapter includes a summary, a set of exercises, and an extensive set of references.

The book is not set up to be a reference work, but for the intended purpose of pulling the topic together and providing moderate depth, it does quite well. Suffice it to say that any one target audience--professionals, managers, or students--will do well to add it to their library. It does cover the field well and, as promised in the preface, no special expertise is required. I highly recommend it.

Reviewer:  James P. Anderson Review #: CR124703 (9709-0681)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Abuse And Crime Involving Computers (K.4.2 ... )
 
 
Ethics (K.7.m ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Security and Protection (D.4.6 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy