An Update On The Books I Am Reading With Analysis

“The Art of Intrusion: The real stories behind the exploits of Hackers, Intruders, and Deceivers” Kevin Mitnick, et al.

– This book had many interesting stories about the various exploits of (mostly anonymous) hackers, con artists, and intelligent deceptive people in general. What I found much more interesting however is Mitnick’s personal take on the various exploits. The book hardly ever actually mentions his own experience in the realm of hacking( An area in which I do very much admire his notorious works), and instead speaks with the tone of a hacker, but a much more grown up, reformed hacker. Throughout various chapters in the book, it becomes apparent the publishers choose Mitnick,(Or at least agreed to finance his project) without a definitive clause stipulating whether he had to be an advocate or adversary of the people mentioned. Many times he calls them intelligent. At others, he insults them for using elementary tactics and lacking real skill. He includes segments on proper security protocols to mitigate a range of attacks, with insights ranging from how to prevent social engineering, to proper network configuration and architecture.

Information Security: Practices and Principles” Mark Stamp, et al.

– Very good book in terms of read especially for a topic that is usually both very hard to comprehend and boring for the average reader. The book covers a broad range of topics related to the field of computer security and delves into a rather deep segment on cryptography including biometric security systems and the current statistics in regards to their effectiveness. Probably the most useful of the books I have read, Information Security not only provides coverage of a wide range of fields, but does so in an efficient enough manner that the reader gets a relatively in-depth grasp of the math behind much of the applications in progress, current practices and protocols in information security, and questions that have yet to be answered.

“Computer Security Managment” Donn B.Parker.

– Computer Security Management is a text aimed more directly at people who either work as business executives and need help determining how to manage their various IT departments. It could also be thought of as a supplementary text pr brief introduction into what IT personnel should and should not do in order to optimize security. The segment on what companies should consider “secret information” and what should be declassified made for an interesting and informative read. The section of computer forensics and asset recovery also provided insight into an area of computer security I am not all that acquainted with(more so the asset recovery). The book takes a very firm stance that a rigid “militaristic type approach” be implemented in regards to job titles and their associated privileges. It also goes in-depth into what personnel type is most likely to commit what type of attack along with preemptive detection techniques and security practices that would stop these potential attacks. This section was most useful in that, it was about thwarting an attack rather than covering areas in which I have a larger library of knowledge such as common attacks and programs.

“Reconfiguring the Firewall: Carol J Burger et al.”

– The title of the book if taken alone, would be a bad indication of what the actual information within the novel is about. Although not directly related to any of my associated topics of research, the book presented a fundamental flaw in today’s world of computer security, a relatively large one at that. It does this by depicting (In detail) a grouping of theories and statistical information on why women do not enter the IT fields. Multiple minds are usually better than one, and most well developed think tanks utilize differing mindsets and personality types, without the perspective of women, a large piece of the defensive puzzle goes missing.


Leave a comment

No comments yet.

Comments RSS TrackBack Identifier URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s