Sei sulla pagina 1di 1

Editor: Marty Stytz, mstytz@att.

net

BookReviews

Building a Foundation
NANCY R. M EAD
Software Engineering Institute

Elisabeth Sullivan wrote, introduces ters. Instructors can use it at the ad-

M any security faculty


members and practi-
tioners bemoan the lack
of good books in the field. Those of
us who teach often find ourselves
assurance basics and formal methods.
The Special Topics section discusses
malicious logic, vulnerability analy-
sis, auditing, and intrusion detection.
Finally, the Practicum ties all the pre-
vanced undergraduate level or for in-
troductory graduate-level computer-
security courses. The preface also
includes a mapping of suggested top-
ics for undergraduate and graduate
forced to rely on collections of pa- viously discussed material to real- courses, presuming a certain amount
pers to fortify our courses. In the last world examples. A ninth additional of math and theoretical computer-
few years, however, we’ve started to section, called End Matter, discusses science background as prerequisites.
miscellaneous supporting mathe- Practitioners can use the book as a re-
matical topics and concludes with an source for information on specific
Reviewed in this issue:
example. At a publisher’s list price of topics; the examples in the Practicum
Matt Bishop, Computer Security: Art and Science, Addison- US$74.99, you’ll want to know why are ideally suited for them.
Wesley, 2003, ISBN 0-201-44099-7; 1,084 pages, US$74.99 you should consider buying such an So, what’s the final verdict? Prac-
expensive book. titioners will want to consider this
see the appearance of some high- Several things set it apart from book as a reference to add to their
quality books to support our en- other, similar, offerings. Most im- bookshelves. Teachers of advanced
deavors. Matt Bishop’s book—Com- portantly, the book provides numer- undergraduate or introductory grad-
puter Security: Art and Science—is ous examples and, refreshingly, defi- uate courses in computer security
definitely hefty and packed with lots nitions. A vertical bar alongside the should consider it as a textbook.
of information. It’s a large book examples distinguishes them from With its extensive definitions, ex-
(with more than 1,000 pages), and it other text, so picking them out is amples, exercises, and suggested
covers most any computer security easy. The book also includes a bibli- readings, it makes an educator’s job
topic that might be of interest. ography of over 1,000 references. much easier—I’ve already found
Fortunately, Bishop breaks all this Additionally, each chapter includes a material that I can use in a report I’m
information down into eight, easy- summary, suggestions for further working on.
to-follow parts: Introduction, Foun- reading, research issues, and practice
dations, Policy, Implementation I exercises. The format and layout are Nancy R. Mead is a senior member of the
(Cryptography), Implementation II good, and the fonts are readable. technical staff and team leader for Sur-
(Systems), Assurance, Special Topics, The book is aimed at several audi- vivable Systems Engineering at the Soft-
ware Engineering Institute, and a faculty
and Practicum. The Foundations ences, and the preface describes many member at Carnegie Mellon University.
section discusses basic security issues roadmaps, one of which discusses de- She has a PhD in mathematics. Contact
at the definitional level. The Policy pendencies among the various chap- her at nrm@sei.cmu.edu.
section addresses the relationship be-
tween policy and security, examin-
ing several types of policies in the
process. Implementation I covers
cryptography and its role in security.
Implementation II describes how to
T his is the debut of our book review department. In this department,
we’ll take a look at books we feel are important to the industry. If
you’d like to review a book, please email Book Reviews editor Marty Stytz
apply policy requirements in sys- at mstytz@att.net.
tems. The Assurance section, which

14 PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003 IEEE ■ IEEE SECURITY & PRIVACY

Potrebbero piacerti anche