Wireless Security and Privacy: Best Practices and Design Techniques Review
Posted by
David Hamer
on 1/23/2012
/
Labels:
assurance,
capstar,
comfortis,
program for cats,
wireless program
Average Reviews:
(More customer reviews)The title of a book needs to be a contract the authors make with the reader. This book is an introduction to wireless with a general coverage of security and a privacy chapter glommed on dressed up as a wireless book. Wireless is such a complex and important issue, that is just wrong to do. The afterword, the future of wireless is essentially content free.
The book is well written, well researched, uses layout and illustrations well and if you are a novice to information security is probably worth hauling on the plane to read.
However, even then beware, one of the major topics appears to be invented by the authors and is passed on as security craft. The I-ADD section is a feature of the book. I had never heard of I-ADD and I do not have a life, all I do is information security. I tried to look it up with google, no results at least through the 3rd page. I wrote ten of my friends in the field, no hits. I tried to look it up in the "bible", Dr. Matt Bishop's 1,000 page, five years in the making, Computer Security Art and Science. I went through Wireless Security and Privacy's bibliography and while there might be a reference I missed, it certainly is not supported to the degree it should be to be so strongly featured in the book. I completely agree that we need thought models to help understand the complex issues of information security, but it would be much more appropriate to use something standard such as Plan Do Check Act (PDCA) from BS7799/ISO-17799.
If you are in the risk management business, the targets and roles that are enumerated in chapter 9 could be worth the price of the book for your trade.
In general, if you are interested in wireless, I would pass on this one, but there is another book by the same major publisher, Pearson Press, How Secure Is Your Wireless Network? by Lee Barkin that is worth a look.
Click Here to see more reviews about: Wireless Security and Privacy: Best Practices and Design Techniques
0 comments:
Post a Comment