REVIEW: "Spies Among Us", Ira Winkler

Discussion in 'Computer Security' started by Rob Slade, doting grandpa of Ryan and Trevor, Jun 22, 2005.

  1. BKSPAMUS.RVW 20050531

    "Spies Among Us", Ira Winkler, 2005, 0-7645-8468-5,
    %A Ira Winkler
    %C 5353 Dundas Street West, 4th Floor, Etobicoke, ON M9B 6H8
    %D 2005
    %G 0-7645-8468-5
    %I John Wiley & Sons, Inc.
    %O U$27.50/C$38.99/UK#16.99 416-236-4433 fax: 416-236-4448
    %O Audience n+ Tech 1 Writing 3 (see revfaq.htm for explanation)
    %P 326 p.
    %T "Spies Among Us"

    In the introduction, Winkler admits that the title is slightly
    misleading: most surveillance is not done by international spies, but
    by common or garden thieves, competitors, and so forth. The point
    that he is trying to make is that non-terrorists can hurt you,
    although he raises the issue with illustrations that are not
    completely clear.

    Part one deals with espionage concepts. Chapter one reviews spying
    terminology, but makes points about the process by explaining the
    jargon and distinctions. Risk analysis is introduced in chapter two,
    but the calculations used may not be clear to all readers. An attempt
    to assess the value of information is made in chapter three. Chapter
    four outlines threats (entities that might harm you) and five covers
    vulnerabilities--the way your own operations can make you subject to

    Part two describes some case studies of spying. The content is
    interesting, although the value is rather concentrated in the short
    "vulnerabilities exploited" section at the end of each chapter. I
    must say that I've read all manner of similar stories and case studies
    in various security books, and Winkler's are more interesting than

    Part three deals with protection. Chapter twelve lists a number of
    countermeasures. These are described in a level of detail that is
    appropriate for non-specialists (in security), although the content
    related to technical safety might be a bit thin. How to plan and
    implement an overall security program is outlined in chapter thirteen,
    which includes a very interesting section on how the Department of
    Homeland Security has taught us valuable lessons about how *not* to
    execute safeguards.

    While not structured in a formal manner that would make for easier
    reference, this book nonetheless has some excellent content. Like
    Schneier's "Beyond Fear" (cf. BKBYNDFR.RVW), it is easy enough, and
    engaging enough, for those outside of the security profession to read.
    Busy managers may find the work a bit wordy and disorganized, but it
    makes useful points, and has constructive suggestions. Home users and
    amateurs will find the style most suited to them, although the
    recommended controls are aimed at businesses. Security professionals
    will not (or should not) find anything new here, but may appreciate
    the "war stories" and explanations that can be employed in security
    awareness training.

    copyright Robert M. Slade, 2005 BKSPAMUS.RVW 20050531


    ============= for back issues:
    [Base URL] site
    or mirror
    CISSP refs: [Base URL]mnbksccd.htm
    Security Dict.: [Base URL]secgloss.htm
    Book reviews: [Base URL]mnbk.htm
    Review mailing list: send mail to
    Rob Slade, doting grandpa of Ryan and Trevor, Jun 22, 2005
    1. Advertisements

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Silverstrand

    Review: Battalion-101~ S Notebook Review

    Silverstrand, Jun 20, 2005, in forum: The Lounge
    Jun 20, 2005
  2. Silverstrand
    Jun 20, 2005
  3. Thad

    DP Review Leica Digilux 2 Review

    Thad, May 11, 2004, in forum: Digital Photography
    May 12, 2004
  4. Mike McGee
    Mike McGee
    Dec 4, 2003
  5. Replies: