Rating:  Summary: Great Book for the Price Review: Dennings Work in this book is great!
Rating:  Summary: A Well Organized Summary of Network Security Review: Dorothy Denning has crafted a comprehensive yet easy to read text on network security. Anyone who ventures on to the Internet and uses telnet, ftp, or SMTP should consider this book required reading. In fact anyone who merely uses Browsers should aquaint themselves with this text. "Information Warefare and Security" provides the reader with theories of information warefare as well as insight into cyber crime. While this book can be used by an academic it can also serve as a guide to the dangersous curves in the information superhighway. As such it is suitable reading for the solitary learner or for college courses in the Internet.Some of the courses that would benefit from assigning this book as supplementary reading are as follows: SOFTWARE SECURITY, eCOMMERCE ISSUES, and INTERNET FOR EDUCATORS. A computer science elective in SOFTWARE SECURITY would benefit from the case studies that vary form viruses to spoofing incidents. An eCOMMERCE elective could use this book to understand the risk management that is necessary in electronic commerce INTERNET FOR EDUCATORS. The book could be used as a supplement to a EDUCATION course for K-12 teachers who need to practice "defensive information techniques" inorder to prevent the spreading of Macro viruses, spoofing of identities that could be used to gather information on students, and understand access controls. In sum, this is a worthy addition to any library
Rating:  Summary: A Well Organized Summary of Network Security Review: Dorothy Denning has crafted a comprehensive yet easy to read text on network security. Anyone who ventures on to the Internet and uses telnet, ftp, or SMTP should consider this book required reading. In fact anyone who merely uses Browsers should aquaint themselves with this text. "Information Warefare and Security" provides the reader with theories of information warefare as well as insight into cyber crime. While this book can be used by an academic it can also serve as a guide to the dangersous curves in the information superhighway. As such it is suitable reading for the solitary learner or for college courses in the Internet. Some of the courses that would benefit from assigning this book as supplementary reading are as follows: SOFTWARE SECURITY, eCOMMERCE ISSUES, and INTERNET FOR EDUCATORS. A computer science elective in SOFTWARE SECURITY would benefit from the case studies that vary form viruses to spoofing incidents. An eCOMMERCE elective could use this book to understand the risk management that is necessary in electronic commerce INTERNET FOR EDUCATORS. The book could be used as a supplement to a EDUCATION course for K-12 teachers who need to practice "defensive information techniques" inorder to prevent the spreading of Macro viruses, spoofing of identities that could be used to gather information on students, and understand access controls. In sum, this is a worthy addition to any library
Rating:  Summary: An informative read that wont put you to sleep! Review: Dorothy Denning has produced one of the best 'easy read' reference books I have seen in years. The writing is one of the most striking aspects of this book; right from the introduction the reader is taken on a logical and structured route through the key aspects of Information Security, with numerous references to real life cases. You don't need a note pad, as the language is clear and concepts explained in simple English. This a excellent book to read on the train/plane: it is interesting, job related, informative but not dull or too intellectually challenging. That said the strength of argument and excellent references are worth the cost of the book alone! I have personally used excerpts form this book to very good effect when making a point to higher management. Of the 50+ IT, Security and InfoSec books have in my collection this is the one I never, lend out.
Rating:  Summary: Comprehensive and well-written Review: Dorothy Denning's book covers almost every aspect of a topic that is of increasing importance. It is written in an ENJOYABLE STYLE and is full of examples, stories and quotations that WELL ILLUSTRATE the points she wants to make. It is an EXCELLENT OVERVIEW of the topic, and for those who are interested in the details, an extensive list of references is included at the end. Whether you are responsible for information security at your enterprise or you are a citizen concerned about your data's privacy, you WILL NOT REGRET if you read this book. However, it could be improved in several areas: Even in an overview like this, more should be said about the controls that can help you protect your data (such as separation of duties, security audits etc.). The numbering of references is restarted in every chapter and so they are hard to find at the end of the book. Most importantly, it should show much less political and cultural bias. A book that is basically about information-related threats and defenses is NOT supposed to be used to protect Attorney General Janet Reno in connection with the Waco case (see Chapter 5) or vent the author's dislike of the Arab countries. For example, if Arab governments control information such as pornography, it is called "censorship", the same thing done by the US government is referred to as "restrictions - also in Chapter 5. (Don't get me wrong: it is NO accident that I lived in the US for years and never ever wished to live in an Arab country, so I am myself biased toward American culture. Even so, I often found Denning too openly manipulative.)
Rating:  Summary: Thorough, academic, and accessible Review: Dorothy E. Denning is an authority not just for the books cited in the other reviews here, but also for her landmark paper to the IEEE which laid the formal foundation for intrusion detection systems. Given her background, one might assume her book would focus on the most technical aspects of security. This is not the case. Her book covers security and privacy issues ranging from classic spying through crypographic means, and is thoroughly footnoted to allow the reader to pursue the trails. One thing I have noted is that higher-ups may become fixated on specific technical fixes. ("If we only had a firewall/intrusion detection system/XXX-bit encryption/YYY operating system, then we would be secure...") This book is something of an antidote to these tendencies. I would heartily recommend this book for anyone concerned with the need for all-round security and training. This is not light reading, but neither does Denning devolve into esoteric discussions of ethernet frames, TCP/IP packets, algorithms. This is the one I would want to give the bosses.
Rating:  Summary: Great book by a great writer Review: Dr. Dorothy Denning is both a genius and a pragmatist. She knows what the real risks are and writes about them. This book is 100% fact and 0% hype. Read it!
Rating:  Summary: Heighten awareness, but not educate Review: Gulf war, fraud, national security, Spam, traitors, and computer viruses. These are just a few of the topics covered by Dorothy Denning's book Information_Warfare_and_Security. This book gives a broad and informative view of information security, however it lacks specifics to make it more than an introductory work to this field. The book has a broad overview of subjects. The Introduction section encompasses around 75 pages and gives substantial theory to the how and why of information security. Part II discusses "Offensive Information Warfare" which brings the reader through techniques on obtaining information. "Defensive Information Warfare" in Part III naturally discusses how to repel the offenses discussed in Part II. Information_Warfare_and_Security is very informative on the problem areas which it discusses. Computers and phones are obvious places for intrusion and the book covers the facets of these areas in depth. The less obvious methodologies are also mentioned such as eavesdropping, traffic analysis, and sabotage. Denning does not leave out the human factor in her sections on social engineering, traitors, and even dumpster diving. Denning's book, however, lacks specific in-depth information. Any chapter subject could have a large book written on it. The book does not give the "how-to's" to create or block an attack; rather it merely discusses the possibilities. To Denning's credit, however, she does include a substantial bibliography and endnotes so the reader can find further information in the source material. Information_Warfare_and_Security would serve the purpose of an excellent introductory overview to the information security field. It is broad and informative, but lacks the specific information to execute any of the offenses or defenses. Denning's book is useful to heighten awareness of information security issues, but it is not sufficient to provide an education in this field.
Rating:  Summary: Heighten awareness, but not educate Review: Gulf war, fraud, national security, Spam, traitors, and computer viruses. These are just a few of the topics covered by Dorothy Denning's book Information_Warfare_and_Security. This book gives a broad and informative view of information security, however it lacks specifics to make it more than an introductory work to this field. The book has a broad overview of subjects. The Introduction section encompasses around 75 pages and gives substantial theory to the how and why of information security. Part II discusses "Offensive Information Warfare" which brings the reader through techniques on obtaining information. "Defensive Information Warfare" in Part III naturally discusses how to repel the offenses discussed in Part II. Information_Warfare_and_Security is very informative on the problem areas which it discusses. Computers and phones are obvious places for intrusion and the book covers the facets of these areas in depth. The less obvious methodologies are also mentioned such as eavesdropping, traffic analysis, and sabotage. Denning does not leave out the human factor in her sections on social engineering, traitors, and even dumpster diving. Denning's book, however, lacks specific in-depth information. Any chapter subject could have a large book written on it. The book does not give the "how-to's" to create or block an attack; rather it merely discusses the possibilities. To Denning's credit, however, she does include a substantial bibliography and endnotes so the reader can find further information in the source material. Information_Warfare_and_Security would serve the purpose of an excellent introductory overview to the information security field. It is broad and informative, but lacks the specific information to execute any of the offenses or defenses. Denning's book is useful to heighten awareness of information security issues, but it is not sufficient to provide an education in this field.
Rating:  Summary: great for anyone interested Review: I am a highschoolstudent and have to do a report on on onliobe information warfare. This book helped me a lot. I leked how it used statistics and a lot of references. you can tell the author is really qualified and she used it in her class. I would recomend this book to anyoine interested in information warefare.
|