Home :: Books :: Nonfiction  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction

Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Information Warfare & Security

Information Warfare & Security

List Price: $47.99
Your Price: $38.29
Product Info Reviews

<< 1 2 >>

Rating: 3 stars
Summary: Mostly a compilation, with a couple of saving graces
Review: I am very reluctant to give much credit for this book to its author. This is primarily because nearly a third of the book is dedicated to bibliography. That, in my opinion, is not really writing; it is compilation.

I was also disappointed at the caliber of anecdotes. I found them to be either totally irrelevant, or totally trite.

I will give credit, however, for the organization and 'soup-to-nuts' primer approach. The chapter organization and flow are superb and I am certain this makes a decent text for non-technical graduate students trying to grasp the concepts of information warfare. The chapter on encryption technology is especially well explained.

Unfortunately, the jacket and editorial reviews (and some of the Amazon reviews) would lead you to believe that this book is a MUST for all information security professionals. It isn't. It is probably, however, a good book for people who have to effectively communicate with information security professionals. Anyone with even a moderate background in information security will not be impressed.

Rating: 3 stars
Summary: Mostly a compilation, with a couple of saving graces
Review: I am very reluctant to give much credit for this book to its author. This is primarily because nearly a third of the book is dedicated to bibliography. That, in my opinion, is not really writing; it is compilation.

I was also disappointed at the caliber of anecdotes. I found them to be either totally irrelevant, or totally trite.

I will give credit, however, for the organization and 'soup-to-nuts' primer approach. The chapter organization and flow are superb and I am certain this makes a decent text for non-technical graduate students trying to grasp the concepts of information warfare. The chapter on encryption technology is especially well explained.

Unfortunately, the jacket and editorial reviews (and some of the Amazon reviews) would lead you to believe that this book is a MUST for all information security professionals. It isn't. It is probably, however, a good book for people who have to effectively communicate with information security professionals. Anyone with even a moderate background in information security will not be impressed.

Rating: 5 stars
Summary: Academic book for everyone
Review: The author uses this book as a reference for her class at university training, and you can see this in the documentation and bibliography that is at the end of the book, each single fact, issue and thing explained is documented with references. No "hearsay" documentation or unverifiable "factoids" but a true, full and comprehensive documentation about all the aspect of security. And this is the second strong point of this book, the fact that cover ALL concerns security, not only computer related issues. Couple this two very good things with a very good writing style and a very readable matters and what you have is maybe one of the best book about security that money can buy. If you are searching a book about specific matters (i.e. Cryptography) this book is not for you (too generic) but if you need a definitive resource for all the aspects of security this book is for you.

Only problem is that, after reading it, you can become a little paranoid...

Rating: 3 stars
Summary: Good overview, lacking depth
Review: The book provides a good overview of information warfare. It is divided into three sections, the introduction, offensive information warfare and finally defensive information warfare. Numerous topics are covered. The author is clearly an expert in security and manages to touch upon all the major information security topics.

The main strength of the book is the breadth of topic selection. By the time you have reached the end of the book, you will have at least a passing acquaintance with all important information security topics. The book is very well referenced and is written in an easy to read style.

The enormous topic selection means that no topic is treated in any particular depth. This means that you'll get to know something about everything, but unfortunately you won't develop an intimate understanding of any of the topics covered.

At times I received the impression that the book was simply a collection of anecdotes. Some parts of the book resembled sensationalistic journalism and, four years after it was written, many parts of the book are out of date. I would recommend this book to anyone looking for a broad overview of information security. Its scatter gun approach means that you'll hit all of the topics but won't develop a true understanding of the underlying mechanisms involved.

Rating: 5 stars
Summary: If this is not a must-read, I don't know what is!
Review: This book covers an important topic and is well written, easy to follow, and comprehensive. You cannot ask for more.

Rating: 4 stars
Summary: A must read for all information warriors
Review: This book is from the author of such classics as 'Cryptography and Data Security' and 'Internet Besieged: Countering Cyberspace Scofflaws'. The author is a well-known and respected authority on security and related issues. In this information age where information is becoming the most critical resource and a strategic weapon, organizations and individuals are doing everything within their powers to secure one's own resources and break into others. The book could not have come at a better time.

The book is a study in detail. The coverage and scope is elaborate, that make one doubt, whether the book can do justice to the TOC. But have no fear, the book not only do justice to the TOC but goes much further. It covers the entire terrain, all the battlefields and explains the concepts, technologies and techniques.

This book covers everything from the simple computer worms to the highly complex and sophisticated information warfare strategies and counter-strategies. If you are in-charge of protecting the information resources of your organization carry this book with you always and give a copy to all the members of your team.

The book's size and binding style could have been improved. The size can be justified for sake of portability. But this is a serious topic, so a slightly bigger font and book size and a 'lay-flat' binding would have made the reading much easier.

Two features that add considerable value to the book are the extensive Bibliography and Endnotes sections. Any body who is not satisfied (most people will be more than satisfied) with the coverage and want to do further research, these sections would prove invaluable.

A list of the security related sites and other resources available on the Internet would have been a valuable addition. Also a glossary of terms would have been nice.

A MUST READ AND MUST TO HAVE BOOK FOR EVERYBODY WHO HAS ANYTHING TO WITH INFORMATION AND INFORMATION TECHNOLOGY. Copyright © 1999, Pegasus Book Club

Rating: 1 stars
Summary: Very disappointed
Review: This is a set book for the University course I'm following. To be honest, I've not read it all. I've read the introductory chapter and picked at the rest of the book.

I'm disappointed that other reviewers suggest that this book is well written and academic. It's a rambling incoherent mess of ideas that proposes large-scale state censorship/'perception control' and as such has no place in universities which should protect the ideals of academic freedom and free speech. The net is not considered as a political forum, rather there is a heavy authoritarianism.

I'm very disappointed with it.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates