Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Digital defense : a cybersecurity primer
Pelton J., Singh I., Springer International Publishing, New York, NY, 2015. 209 pp. Type: Book (978-3-319199-52-8)
Date Reviewed: Dec 22 2015

Do you have elderly or young relatives who use the Internet? Do you need a clear, nontechnical, small (200 pages) book to explain basic cybersecurity? If so, this is for you. Written for a general audience, with end-of-chapter references for the more technically and detail minded, readers will be pleased to place this excellent presentation on their bookshelves.

This book assesses very practical cyber-threats, such as baby monitors being hacked. Do you understand ransomware, data bombs, and Trojan horses? What professional services are available to address cyber-bullying? What is identity theft? What current computer security services are available? The eight chapters draw the reader from topic to topic. What is at stake? Where can one go for assistance? Is anyone looking out for you? What are ten key things to protect? The book also covers the following topics: “cybersecurity for smart phones, mobile apps, and the cloud”; protecting vital cyber infrastructure; Who will control the future: black hat hackers or the hacked?; and “ten essential rules for your cyber-defense.” All of these and more very significant topics are presented in an interesting and very readable format.

If you wish that you had a small dictionary of definitions and acronyms related to hacking and cybersecurity, it is attached as an appendix. This is a great way for readers to grasp basic essential contemporary cybersecurity language. Attached also are the current US priorities and initiatives on cybersecurity, as well as cybersecurity activities and policies from around the world. Additionally, there is a general index.

This excellent presentation is readable by novices. It is so well rounded that even a seasoned professional will be reminded of issues to address. It achieves a great balance between not talking down to readers and not losing the reader in a maze of technicalities. Readers will enjoy and learn from this book.

Reviewer:  Brad Reid Review #: CR144052 (1603-0199)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Public Policy Issues (K.4.1 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy