Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Privacy Defended", Gary Bahadur/William Chan/Chris Weber

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKPRVDFN.RVW 20020923 Privacy Defended , Gary Bahadur/William Chan/Chris Weber, 2002, 0-7897-2605-X, U$34.99/C$54.99/UK#25.50 %A Gary Bahadur
    Message 1 of 1 , Dec 9, 2002
      BKPRVDFN.RVW 20020923

      "Privacy Defended", Gary Bahadur/William Chan/Chris Weber, 2002,
      0-7897-2605-X, U$34.99/C$54.99/UK#25.50
      %A Gary Bahadur gary@...
      %A William Chan william@...
      %A Chris Weber chris.weber@...
      %C 201 W. 103rd Street, Indianapolis, IN 46290
      %D 2002
      %G 0-7897-2605-X
      %I Macmillan Computer Publishing (MCP)
      %O U$34.99/C$54.99/UK#25.50 800-858-7674 info@...
      %O http://www.amazon.com/exec/obidos/ASIN/078972605X/robsladesinterne
      %P 699 p.
      %T "Privacy Defended: Protecting Yourself Online"

      The introduction states that this is a privacy book for non-
      specialists, but the write up seems to deal with computer intrusions
      or malware rather than privacy issues.

      Part one talks about life in the digital age. Chapter one is an
      uncompelling demonstration of how to obtain personal information
      online plus more on intrusions and a lengthy outline of the rest of
      the chapters in the book. There is a slightly unfocused look at
      privacy laws and related issues in chapter two. Various government,
      industry, commercial, and other groups and agencies (as well as a few
      programs) are described in chapter three.

      Part two tells us that the enemy is out there. Chapter four points
      out legal threats to individual privacy that people may not know
      about, but not in much detail. Illegal threats, such as blackhats,
      intruders, identity theft, and fraud (as well as those of questionable
      legality, like spyware) are reviewed in chapter five.

      Part three looks at protecting your privacy. Chapter six lists lookup
      and anonymity tools. Cookies, spyware, some tools, and payment
      systems are presented in chapter seven. Spam, malware, and PGP are
      discussed in chapter eight, along with miscellaneous other topics
      related to email.

      Part four advises on securing your PC. Chapter nine reviews SSL
      (Secure Sockets Layer) and digital certificates, but because
      cryptography has not been explained the background discussion is poor.
      (It is also sometimes erroneous: for most people SSL does *not*
      authenticate the client.) A collection of random security factors and
      tools, by operating system, is presented in chapter ten. (The
      division by operating system is not always clear: tools vary on
      different versions of Windows, and this is not made clear. There are
      also a number of errors: IPSec is an Internet protocol and has nothing
      to do with the Microsoft Windows IP Security Policy.) Screen shots of
      configuration menus for personal firewalls make up most of chapter
      eleven. Chapter twelve deals with viruses (poorly), chat (chat
      systems seem to be almost inherently insecure, so it's hard to
      understand why), and cryptography (poorly and briefly). Miscellaneous
      and random network topics are covered in chapter thirteen.

      Part five looks at other devices, in a single chapter, fourteen,
      covering various gadgets, threats, and protections--not necessarily
      for those threats.

      Part six says what to do if your privacy is compromised. Chapter
      fifteen mentions kids, mostly rehashing previous material and adding
      content restriction. Intrusion detection and a review of other tools
      from prior chapters finishes out in sixteen.

      This book is not really about privacy, it is yet another attempt at a
      general security guide. "Protect Your Digital Privacy" (cf.
      BKPYDPRV.RVW) sticks much closer to the privacy topic. "Inside
      Internet Security" (cf. BKININSC.RVW) and even "Access Denied" (cf.
      BKACCDEN.RVW) are better at covering general security for non-

      copyright Robert M. Slade, 2002 Permission to distribute free electronic
      copies is hereby granted but printed copy or copy distributed for
      financial gain is forbidden BKPRVDFN.RVW 20020923

      rslade@... rslade@... slade@... p1@...
      Find book info victoria.tc.ca/techrev/ or sun.soci.niu.edu/~rslade/
      Upcoming (ISC)^2 CISSP CBK review seminars (+1-888-333-4458):
      December 16, 2002 December 20, 2002 San Francisco, CA
      February 10, 2003 February 14, 2003 St. Louis, MO
      March 31, 2003 April 4, 2003 Indianapolis, IN
    Your message has been successfully submitted and would be delivered to recipients shortly.