Give More Get More: Earn bonus points
on every item with orders of 3+ books
Skip to content
Scan a barcode
Scan
Paperback Information Warfare and Security Book

ISBN: 0201433036

ISBN13: 9780201433036

Information Warfare and Security

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$7.99
Save $52.00!
List Price $59.99
Almost Gone, Only 1 Left!

Book Overview

This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations,... This description may be from another edition of this product.

Customer Reviews

5 ratings

An informative read that wont put you to sleep!

Dorothy Denning has produced one of the best 'easy read' reference books I have seen in years. The writing is one of the most striking aspects of this book; right from the introduction the reader is taken on a logical and structured route through the key aspects of Information Security, with numerous references to real life cases. You don't need a note pad, as the language is clear and concepts explained in simple English. This a excellent book to read on the train/plane: it is interesting, job related, informative but not dull or too intellectually challenging. That said the strength of argument and excellent references are worth the cost of the book alone! I have personally used excerpts form this book to very good effect when making a point to higher management. Of the 50+ IT, Security and InfoSec books have in my collection this is the one I never, lend out.

A Well Organized Summary of Network Security

Dorothy Denning has crafted a comprehensive yet easy to read text on network security. Anyone who ventures on to the Internet and uses telnet, ftp, or SMTP should consider this book required reading. In fact anyone who merely uses Browsers should aquaint themselves with this text. "Information Warefare and Security" provides the reader with theories of information warefare as well as insight into cyber crime. While this book can be used by an academic it can also serve as a guide to the dangersous curves in the information superhighway. As such it is suitable reading for the solitary learner or for college courses in the Internet.Some of the courses that would benefit from assigning this book as supplementary reading are as follows: SOFTWARE SECURITY, eCOMMERCE ISSUES, and INTERNET FOR EDUCATORS.A computer science elective in SOFTWARE SECURITY would benefit from the case studies that vary form viruses to spoofing incidents.An eCOMMERCE elective could use this book to understand the risk management that is necessary in electronic commerceINTERNET FOR EDUCATORS. The book could be used as a supplement to a EDUCATION course for K-12 teachers who need to practice "defensive information techniques" inorder to prevent the spreading of Macro viruses, spoofing of identities that could be used to gather information on students, and understand access controls.In sum, this is a worthy addition to any library

Thorough, academic, and accessible

Dorothy E. Denning is an authority not just for the books cited in the other reviews here, but also for her landmark paper to the IEEE which laid the formal foundation for intrusion detection systems. Given her background, one might assume her book would focus on the most technical aspects of security. This is not the case. Her book covers security and privacy issues ranging from classic spying through crypographic means, and is thoroughly footnoted to allow the reader to pursue the trails. One thing I have noted is that higher-ups may become fixated on specific technical fixes. ("If we only had a firewall/intrusion detection system/XXX-bit encryption/YYY operating system, then we would be secure...") This book is something of an antidote to these tendencies. I would heartily recommend this book for anyone concerned with the need for all-round security and training. This is not light reading, but neither does Denning devolve into esoteric discussions of ethernet frames, TCP/IP packets, algorithms. This is the one I would want to give the bosses.

great for anyone interested

I am a highschoolstudent and have to do a report on on onliobe information warfare. This book helped me a lot. I leked how it used statistics and a lot of references. you can tell the author is really qualified and she used it in her class. I would recomend this book to anyoine interested in information warefare.

Academic book for everyone

The author uses this book as a reference for her class at university training, and you can see this in the documentation and bibliography that is at the end of the book, each single fact, issue and thing explained is documented with references. No "hearsay" documentation or unverifiable "factoids" but a true, full and comprehensive documentation about all the aspect of security. And this is the second strong point of this book, the fact that cover ALL concerns security, not only computer related issues. Couple this two very good things with a very good writing style and a very readable matters and what you have is maybe one of the best book about security that money can buy. If you are searching a book about specific matters (i.e. Cryptography) this book is not for you (too generic) but if you need a definitive resource for all the aspects of security this book is for you.Only problem is that, after reading it, you can become a little paranoid...
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured