Wonder Club world wonders pyramid logo
×

Reviews for Visions of Privacy: Policy Choices for the Digital Age

 Visions of Privacy magazine reviews

The average rating for Visions of Privacy: Policy Choices for the Digital Age based on 2 reviews is 3 stars.has a rating of 3 stars

Review # 1 was written on 2010-07-28 00:00:00
1999was given a rating of 3 stars Michelle Jennings
This is a good round up of the state of our privacy in the world we currently live in. Emphasis is on the British context, although with plenty of information regarding other countries - particularly Europe and North America. The book does not go into huge depth on any one issue, but does offer some practical and helpful advice. There was much I already knew in here, but occasionally there were snippets of informative information. Anyone worried about privacy in the Information age could do worse than read this book (although non British readers - your mileage will vary).
Review # 2 was written on 2011-08-09 00:00:00
1999was given a rating of 3 stars Ross Flathouse
This book covers security at Many different levels (tries to be comprehensive)... although this is a constantly changing topic of study, every time new tactics are used by some hacker/virus/trojan...etc. Topic included are: the "Meaning of Computer Security", Attacks & methods of defense, cryptology, software(code) security, Viruses, root-hacks, Operating system security, Trusted-systems, File protections, Database security, SQL injection, Multi-Level approaches, Networks, firewalls, Vlans, Session hijacking, flaws in net protocols, Web site vulnerabilities, Alarms, monitoring, countermeasures, Administration, Risk Analysis, Physical building security, Data privacy, computer ethics, Email monitoring or interception, spoofing, phishing, computer crime, code of ethics, SOA Architecture, and more... This is certainly not a "light read" or something you complete in a week; but for somebody who runs computers professionally, there is a lot of info here -so you know several problem issues to avoid when designing new computer systems. I would also recommend knowing the ISO-27001 and ISO-27009 standards, and similar security standards from OWASP (Open.Web.Application.Security.Project), plus Oasis-open.org guides.


Click here to write your own review.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!