Month: May 2004
-
Book Review: Cyber Crime
[The date of publication is not known.] Cyber CrimeHow to Protect Yourself from Computer CriminalsLaura E. Quarantiello0-936653-74-4, Tiare Publications/Limelight Books Part One: Chapter One – ‘Terrorism On Line: Inside Comptuer Crime’: Chapter one opens with defining computer crime, and does a decent (and fair) job of defining why hackers hack. “In the end, it all…
-
Book Review: The Happy Hacker: A Guide to (Mostly) Harmless Computer Hacking
[The date of publication is not known.] The Happy Hacker: A Guide to (Mostly) Harmless Computer HackingCarolyn P. Meinel0-929408-21-7, 268 pages, American Eagle PublicationsTechnical Editors: John D. Robinson, Roger A. Prata, Daniel Gilkerson, Damian Bates, Mark Schmitz, Troy Larsen My first impression of the book was a make money fast scheme gone wrong. Cashing in…
-
Book Review: Investigating Computer Crime
[The date of publication is not known.] Investigating Computer CrimeFranklin Clark, Ken Diliberto0-8493-8158-4, 228 pages, CRC Press, INC Chapter 1 – “Computer Search Warrant Team”: Chapter one starts out quick and to the point. In this three page chapter, the authors outline six groups that make up a computer search warrant team. Supervisor, Interview Team,…
-
Book Review: Time Based Security
[The date of publication is not known.] Time Based SecurityPractical and Provable Methods to Protect Enterprise and Infrastructure, Networks and NationWinn Schwartau0-672-31341-3, 174 pages, Interpact Press What is TBS (Time Based Security)? TBS is defined by the author as “a non-technical examination of the very foundation of the technical realities of the networked society. It…
-
Book Review: Ethical and Social Issues in the Information Age
[The date of publication is not known.] Ethical and Social Issues in the Information AgeUndergraduate Texts in Computer ScienceJoseph Migga Kizza0-387-98275-2, 172 Pages, Springer-Verlag Overview: “Ethical and Social Issues in the Information Age” is an excellent foundation and resource for defining ethics and morals in a technological world. For any reader interested in exploring this…
-
Book Review: @Large
[The date of publication is not known.] @LargeThe Strange Case of The World’s Biggest Internet InvasionDavid H. Freedman and Charles C. MannISBN: 0-684-82464-7, Hardback: $24.00 From the inside cover: “At Large is the astonishing, never-before-revealed tale of perhaps the biggest and certainly the most disturbing computer attack to date, with ominous implications for the Internet,…
-
Book Review: The Complete Idiot’s Guide to Protecting Yourself Online
[The date of publication is not known.] The Complete Idiot’s Guide to Protecting Yourself OnlinePreston Gralla0-7897-2035-3, 348 pages, Que: Alpha Books Are you a Windows95 user? Do you use America Online and read mail with Outlook Express? Browse the web with Internet Explorer? New to the Internet and have concerns about your safety and privacy?…
-
Book Review: Hacking Exposed: Network Security Secrets & Solutions
[The date of publication is not known.] Hacking Exposed: Network Security Secrets & SolutionsStuart McClure, Joel Scambray, George Kurtzhttp://www.hackingexposed.com0072121270, 484 pages, McGraw-Hill Since 1991, I have been involved in the security field in one way or another. Starting as a casual hobby and evolving into a career, it has been a predominant part of my…
-
Book Review: EDI Security, Control, and Audit
[The date of publication is not known.] EDI Security, Control, and AuditAlbert J. Marcella, Jr. and Sally Chan0-89006-610-8, Artech Electronic Data Interchange (EDI) is a computer-to-computer or application-to-application exchange of business information in a standard format. In 1992, there were over 31,000 known EDI users, with a steady increase since 1987. EDI users can be…
-
Book Review: Security Warrior
[The date of publication is not known.] Security WarriorCyrus Peikari & Anton ChuvakinPaperback – 581 pages (January, 2004)$44.95 – O’Reilly ISBN: 0-596-00545-8 Security Warrior is one of the latest books that attempts to cover hacking and security information in a way that appeals to all levels of the field. Most books of this nature will…