REVIEW: "Privacy Defended", Gary Bahadur/William Chan/Chris Weber
- BKPRVDFN.RVW 20020923
"Privacy Defended", Gary Bahadur/William Chan/Chris Weber, 2002,
%A Gary Bahadur gary@...
%A William Chan william@...
%A Chris Weber chris.weber@...
%C 201 W. 103rd Street, Indianapolis, IN 46290
%I Macmillan Computer Publishing (MCP)
%O U$34.99/C$54.99/UK#25.50 800-858-7674 info@...
%P 699 p.
%T "Privacy Defended: Protecting Yourself Online"
The introduction states that this is a privacy book for non-
specialists, but the write up seems to deal with computer intrusions
or malware rather than privacy issues.
Part one talks about life in the digital age. Chapter one is an
uncompelling demonstration of how to obtain personal information
online plus more on intrusions and a lengthy outline of the rest of
the chapters in the book. There is a slightly unfocused look at
privacy laws and related issues in chapter two. Various government,
industry, commercial, and other groups and agencies (as well as a few
programs) are described in chapter three.
Part two tells us that the enemy is out there. Chapter four points
out legal threats to individual privacy that people may not know
about, but not in much detail. Illegal threats, such as blackhats,
intruders, identity theft, and fraud (as well as those of questionable
legality, like spyware) are reviewed in chapter five.
Part three looks at protecting your privacy. Chapter six lists lookup
and anonymity tools. Cookies, spyware, some tools, and payment
systems are presented in chapter seven. Spam, malware, and PGP are
discussed in chapter eight, along with miscellaneous other topics
related to email.
Part four advises on securing your PC. Chapter nine reviews SSL
(Secure Sockets Layer) and digital certificates, but because
cryptography has not been explained the background discussion is poor.
(It is also sometimes erroneous: for most people SSL does *not*
authenticate the client.) A collection of random security factors and
tools, by operating system, is presented in chapter ten. (The
division by operating system is not always clear: tools vary on
different versions of Windows, and this is not made clear. There are
also a number of errors: IPSec is an Internet protocol and has nothing
to do with the Microsoft Windows IP Security Policy.) Screen shots of
configuration menus for personal firewalls make up most of chapter
eleven. Chapter twelve deals with viruses (poorly), chat (chat
systems seem to be almost inherently insecure, so it's hard to
understand why), and cryptography (poorly and briefly). Miscellaneous
and random network topics are covered in chapter thirteen.
Part five looks at other devices, in a single chapter, fourteen,
covering various gadgets, threats, and protections--not necessarily
for those threats.
Part six says what to do if your privacy is compromised. Chapter
fifteen mentions kids, mostly rehashing previous material and adding
content restriction. Intrusion detection and a review of other tools
from prior chapters finishes out in sixteen.
This book is not really about privacy, it is yet another attempt at a
general security guide. "Protect Your Digital Privacy" (cf.
BKPYDPRV.RVW) sticks much closer to the privacy topic. "Inside
Internet Security" (cf. BKININSC.RVW) and even "Access Denied" (cf.
BKACCDEN.RVW) are better at covering general security for non-
copyright Robert M. Slade, 2002 Permission to distribute free electronic
copies is hereby granted but printed copy or copy distributed for
financial gain is forbidden BKPRVDFN.RVW 20020923
rslade@... rslade@... slade@... p1@...
Find book info victoria.tc.ca/techrev/ or sun.soci.niu.edu/~rslade/
Upcoming (ISC)^2 CISSP CBK review seminars (+1-888-333-4458):
December 16, 2002 December 20, 2002 San Francisco, CA
February 10, 2003 February 14, 2003 St. Louis, MO
March 31, 2003 April 4, 2003 Indianapolis, IN