Browse All Reviews
Computing Milieux (K)
Management Of Computing And Information Systems (K.6)
> Security (K.6.m...)
All Media Types
1-10 of 43 Reviews about "
Behavioral cybersecurity: applications of personality psychology and computer science
Patterson W., Winston-Proctor C., CRC Press, Boca Raton, FL, 2019. 261 pp. Type: Book (978-1-138617-78-0)
It is a well-known fact that the weakest element of all cryptographic systems is a human being. No matter how smart mathematical methods are embedded to protect our network and computer infrastructures, nor how precisely we design the precautionar...
Jun 21 2022
Engineering trustworthy systems: a principled approach to cybersecurity
Saydjari O. Communications of the ACM 62(6): 63-69, 2019. Type: Article
In this article--an extract of his book on 223 security principles --Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who want to build secure systems....
Nov 4 2019
Application of big data for national security: a practitioner’s guide to emerging technologies
Akhgar B., Saathoff G., Arabnia H., Hill R., Staniforth A., Bayerl P., Butterworth-Heinemann, Waltham, MA, 2015. 316 pp. Type: Book (978-0-128019-67-2)
It is a pleasure to review a compilation of current works that address diverse perspectives of the timely topic of big data analytics for national security. The work consists of 18 chapters organized by topic areas into four sections....
Sep 8 2016
Core software security: security at the source
Ransome J., Misra A., Auerbach Publications, Boston, MA, 2014. 416 pp. Type: Book (978-1-466560-95-6)
There are many meanings of the term software security in computing, with each meaning depending on the point of view. Loosely speaking, in the process view of security, there are two essential complementary concepts: organizational security and op...
Jan 28 2015
Blaming noncompliance is too convenient: What really causes information breaches?
Renaud K. IEEE Security and Privacy 10(3): 57-63, 2012. Type: Article
Information leaks caused by malicious insiders account for approximately 60 percent of all losses from security attacks. In many (if not all) cases, existing security rules should have prevented the incident. So, what is wrong with current complia...
Oct 17 2012
Holistically building the cybersecurity workforce
Hoffman L., Burley D., Toregas C. IEEE Security and Privacy 10(2): 33-39, 2012. Type: Article
Most if not all members of the cybersecurity workforce are autodidacts. They rolled into security from another discipline, learned on the job, took a few courses, and attended seminars and conferences. Now, they are security professionals, or at l...
Aug 10 2012
Algebra and logic for access control
Collinson M., Pym D. Formal Aspects of Computing 22(2): 83-104, 2010. Type: Article
Access control is ubiquitous to the extent that we hardly perceive its presence in our activities--from who we give our house keys to, to who can authorize the publication of article reviews on a Web site. In light of this, the relative pauci...
Aug 25 2010
Critical information infrastructures: resilience and protection
Hyslop M., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 277 pp. Type: Book (9780387718613)
Critical information infrastructures are at risk in two ways: they are vital to internal operations, and they provide opportunities for damage from economic warfare by terrorists and others opposed to the economic system. This suggests the need fo...
Feb 27 2008
Handbook of effective disaster/recovery planning: a seminar/workshop approach
Arnell A., Davis D., McGraw-Hill, Inc., New York, NY, 1990.Type: Book (9789780070023949)
Alvin Arnel has worked with more than 165 organizations to help them develop disaster recovery plans. With his associate Donald Davis, he created a workshop approach that proved to be effective in getting his customers to develop and maintain thei...
Nov 1 1990
Computer security--virus highlights need for improved Internet management
, 1989.Type: Book (9780262121415)
The Internet virus of November 1988 needs no introduction as it is now part of computer history. As a result of the concern generated by this incident, the U.S. General Accounting Office (GAO) was asked to produce this report. The report describes...
Oct 1 1990
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.