Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Netspionage: The Global Threat to Information", William

Expand Messages
  • Rob Slade, doting grandpa of Ryan and Tr
    BKNTSPNG.RVW 20001120 Netspionage: The Global Threat to Information , William Boni/Gerald L. Kovacich, 2000, 0-7506-7257-9 %A William Boni %A Gerald L.
    Message 1 of 1 , Jan 15, 2001
    • 0 Attachment
      BKNTSPNG.RVW 20001120

      "Netspionage: The Global Threat to Information", William Boni/Gerald
      L. Kovacich, 2000, 0-7506-7257-9
      %A William Boni
      %A Gerald L. Kovacich www.shockwavewriters.com
      %C 225 Wildwood Street, Woburn, MA 01801
      %D 2000
      %G 0-7506-7257-9
      %I Butterworth-Heinemann/CRC Press/Digital Press
      %O 800-366-BOOK fax 617-933-6333 800-446-6520 liz.mccarthy@...
      %P 260 p.
      %T "Netspionage: The Global Threat to Information"

      In the preface, the authors state that this book is different from all
      the others because it points out that the Internet can make it easy
      and cheap to steal information. While this fact may be new to Boni
      and Kovacich, it shouldn't come as a big surprise to many other
      people. The preface also states that this text will teach you how to
      filch data from other people, and then closes by hoping that the work
      will ensure the security of Internet use. (We are also told that the
      book is based on seminars that the authors give, which probably
      explains a large number of illustrations that don't explain anything.)

      Part one seems to want to be a kind of historical perspective on the
      factors creating the current situation. Chapter one lets us in on the
      fact that lots of people are fighting with and spying on each other.
      Computers and high technology have been invented and are being used,
      according to chapter two. The analysis of the Internet's potential
      for criminal misuse, in chapter three, is slightly less simplistic,
      but fails to provide anything like a full picture. Chapter four is a
      rather mixed bag, stating that information is important, that there is
      a "new world order," and that e-business exists. A lot of space is
      devoted to definitions of espionage, and how it used to be done, in
      chapter five, but the book does finally start to mention some random
      points on data security at this point.

      Part two is probably supposed to be the "how to" section of the book.
      Chapter six dives back into the dictionaries but fails to give a solid
      definition of "competitive intelligence." The only actual examples of
      information gathering in chapter seven involve the use of phone books
      and trash, not the net. A few actual espionage tools, a number of
      useful tools that a spy might conceivably also want to use, and a lot
      of insistence that netspionage is possible makes up chapter eight.
      Chapter nine briefly describes some alleged and some prosecuted cases
      of espionage, but details are almost non-existent.

      Part three talks about protection against espionage. Chapter ten
      presents a very basic outline for starting discussion of data security
      issues. Chapter eleven goes slightly further in assessing risks and
      threats. The suggestion to undertake retaliation and vigilante
      action, tentatively though it is made in chapter twelve, is a really
      stupid idea.

      Not content with the usual short bit of blueskying, part four looks to
      the imaginary future. Chapters thirteen through seventeen take
      fanciful looks at the future of technology, business, espionage,
      government, and everything.

      This is yet another shrill voice crying in the marketplace and telling
      us what we already knew. It lacks detail, analysis, reality, and even
      an identifiable central theme.

      copyright Robert M. Slade, 2000 BKNTSPNG.RVW 20001120

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... rslade@... slade@... p1@...
      What I need is a list of specific unknown problems we will
      encounter. - manager at Lykes Lines Shipping, from DNRC newsletter
      http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade
    Your message has been successfully submitted and would be delivered to recipients shortly.