Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Information Systems (H) > Database Management (H.2) > General (H.2.0) > Security, Integrity, And Protection (H.2.0...)  
  1-10 of 102 Reviews about "Security, Integrity, And Protection (H.2.0...)": Date Reviewed
  Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J.,  Springer International Publishing, New York, NY, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (2 of 2)

Frankly, my first reaction to this book was a silent groan. Why do some people seem to think that a technical book must be obscure, unbelievably boring, and written by people with poor-to-mediocre language skills? Come on! Read Knuth’s Th...

Apr 25 2022
  Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J.,  Springer International Publishing, New York, NY, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (1 of 2)

“Internet of Things (IoT)” is a popular term used to describe ubiquitous devices: a broad range of small, connected computing devices that are constrained in memory, processing capacity, and electrical power. The interconnected nature ...

Feb 10 2022
  Principles of secure processor architecture design
Szefer J.,  Morgan&Claypool Publishers, San Rafael, CA, 2018. 173 pp. Type: Book (978-1-681730-01-1)

The growing use of processors where multiple applications are executed concurrently, as in cloud computing, has increased the need for security features that can protect these applications from mutual interference. Additionally, a successful exter...

Jun 25 2021
  Privacy in mobile and pervasive computing
Langheinrich M., Schaub F.,  Morgan&Claypool Publishers, San Rafael, CA, 2019. 127 pp. Type: Book (978-1-681731-17-9)

Mobile and pervasive computing can offer really valuable benefits, such as making our lives more convenient, efficient, and safe. This is done through tailored and context-aware services that anticipate what we need, as well as where and when we n...

Sep 23 2020
  The perfect weapon: war, sabotage, and fear in the cyber age
Sanger D.,  Crown Publishing Group, New York, NY, 2018. 384 pp. Type: Book (978-0-451497-89-5)

A thriller-type story, albeit one that happens in the real world, this book is about those parts of the Internet filled with people trying to exploit it--all you need is a computer and Internet access. Just the fact that any residential modem...

Jun 18 2020
  Internet of Things: information security challenges and solutions
Miloslavskaya N., Tolstoy A.  Cluster Computing 22(1): 103-119, 2019. Type: Article

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for developing services and applications, it has many info...

Jan 9 2020
  2018: a big year for privacy
Landwehr C.  Communications of the ACM 62(2): 20-22, 2019. Type: Article

Privacy and security issues reached high visibility in 2018, with many major publicized incidents. Carl Landwehr starts with the Facebook–Cambridge Analytica scandal, and then describes regulatory efforts such as the European Union (EU) General Da...

Nov 7 2019
  Handbook of e-business security
Tavares J., Mishra B., Kumar R., Zaman N., Khari M.,  CRC Press, Inc., Boca Raton, FL, 2019. 422 pp. Type: Book (978-1-138571-30-3)

This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography ...

Apr 3 2019
  Security in high-performance computing environments
Peisert S.  Communications of the ACM 60(9): 72-80, 2017. Type: Article

Peisert starts with the question of whether there is any difference between high-performance computing and the traditional computational environment in terms of security. Apparently, there are no profound differences, aside from speed and volume, ...

Nov 28 2017
  Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A.  Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article

I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “privacy information pr...

Nov 7 2017
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy