Privacy & Individual Rights
Commerce, Security, & the Law
Net Culture, Art, & Literature
International Affairs & National Security
Ethics, Rhetoric, & Metaphysics
Science Fiction Other Resources
Other Book Review Sites
When I first read the title
The subtitle accurately reflects the book's contents. Among other topics, Rothke describes phishing attacks, the need to secure media such CDs and flash drives, turning on firewalls, and maintaining adequate virus protection through updates. Each section's action items are expressed in general terms, but that's understandable in a book that's clearly meant as a policy document to be supplemented by specific directions from an organization's information technology staff.
Technical professionals might flip through this book and think that the information it contains is obvious, but you have to remember that the vast majority of computer users in the corporate and non-profit worlds have only the vaguest idea of how potentially vulnerable they are. This book will help raise consciousness and enable organizations to demonstrate that they had a policy in place should any liability issues arise.
I like what Rothke and McGraw-Hill have done with