Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > REVIEW: "Spies Among Us", Ira Winkler

Thread Tools

REVIEW: "Spies Among Us", Ira Winkler

Rob Slade, doting grandpa of Ryan and Trevor
Posts: n/a

"Spies Among Us", Ira Winkler, 2005, 0-7645-8468-5,
%A Ira Winkler
%C 5353 Dundas Street West, 4th Floor, Etobicoke, ON M9B 6H8
%D 2005
%G 0-7645-8468-5
%I John Wiley & Sons, Inc.
%O U$27.50/C$38.99/UK#16.99 416-236-4433 fax: 416-236-4448
%O Audience n+ Tech 1 Writing 3 (see revfaq.htm for explanation)
%P 326 p.
%T "Spies Among Us"

In the introduction, Winkler admits that the title is slightly
misleading: most surveillance is not done by international spies, but
by common or garden thieves, competitors, and so forth. The point
that he is trying to make is that non-terrorists can hurt you,
although he raises the issue with illustrations that are not
completely clear.

Part one deals with espionage concepts. Chapter one reviews spying
terminology, but makes points about the process by explaining the
jargon and distinctions. Risk analysis is introduced in chapter two,
but the calculations used may not be clear to all readers. An attempt
to assess the value of information is made in chapter three. Chapter
four outlines threats (entities that might harm you) and five covers
vulnerabilities--the way your own operations can make you subject to

Part two describes some case studies of spying. The content is
interesting, although the value is rather concentrated in the short
"vulnerabilities exploited" section at the end of each chapter. I
must say that I've read all manner of similar stories and case studies
in various security books, and Winkler's are more interesting than

Part three deals with protection. Chapter twelve lists a number of
countermeasures. These are described in a level of detail that is
appropriate for non-specialists (in security), although the content
related to technical safety might be a bit thin. How to plan and
implement an overall security program is outlined in chapter thirteen,
which includes a very interesting section on how the Department of
Homeland Security has taught us valuable lessons about how *not* to
execute safeguards.

While not structured in a formal manner that would make for easier
reference, this book nonetheless has some excellent content. Like
Schneier's "Beyond Fear" (cf. BKBYNDFR.RVW), it is easy enough, and
engaging enough, for those outside of the security profession to read.
Busy managers may find the work a bit wordy and disorganized, but it
makes useful points, and has constructive suggestions. Home users and
amateurs will find the style most suited to them, although the
recommended controls are aimed at businesses. Security professionals
will not (or should not) find anything new here, but may appreciate
the "war stories" and explanations that can be employed in security
awareness training.

copyright Robert M. Slade, 2005 BKSPAMUS.RVW 20050531

====================== Removed) (E-Mail Removed) (E-Mail Removed)
============= for back issues:
[Base URL] site
or mirror
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Book reviews: [Base URL]mnbk.htm
Review mailing list: send mail to (E-Mail Removed)
or (E-Mail Removed)

Reply With Quote

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Jarow-Winkler algorithm: Measuring similarity between strings Řyvind Python 5 12-20-2008 12:55 PM
Implementing routing among VPN-connected sites Mirko Cisco 2 08-30-2004 06:02 PM
Share SQL DB Among Dozens of Sites Guadala Harry ASP .Net 1 02-21-2004 06:50 PM
DataTable.Select not unique among users?? Kris Rudin ASP .Net 2 08-18-2003 09:57 PM
Re: demand among mcse 2000/2003 Andy Foster MCSE 0 08-10-2003 02:51 PM