Browse Prior Art Database

IEEE Computer Volume 11 Number 9 -- BOOK REVIEWS

IP.com Disclosure Number: IPCOM000131242D
Original Publication Date: 1978-Sep-01
Included in the Prior Art Database: 2005-Nov-10
Document File: 2 page(s) / 16K

Publishing Venue

Software Patent Institute

Related People

IEEE Computer Society: OWNER [+2]

Abstract

BOOK REVIEWS

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

THIS DOCUMENT IS AN APPROXIMATE REPRESENTATION OF THE ORIGINAL.

This record contains textual material that is copyright ©; 1978 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Contact the IEEE Computer Society http://www.computer.org/ (714-821-8380) for copies of the complete work that was the source of this textual material and for all use beyond that as a record from the SPI Database.

BOOK REVIEWS

Recently published books and new periodicals may be submitted for review to the Book Reuiews Editor:

Dr. Francis P. Mathur

Professor and Computer Science
Coord inator
Mathematics Department
California State Polytechnic
University 3801 WestTempleAuenue
Pomona, CA 91 i68
Telephone: (714) 5984421

(Note: publications reviewed in this section are not available from the IEEEComputerSociety. Please order directly from the publisher.)

B78-24 Computer Capers -- T. Whiteside

(New York: Thomas Y. Crowell Co., 1978, 164 pp., $7.95)

This book succeeds in concisely presenting the dominant role of the computer in information processing which has led to computer abuse and computer-related crime. It summarizes individual cases of physical attacks on computers, destruction of stored data, and the use of the computer in embezzlement schemes involving millions of dollars. From these cases, patterns emerge which indicate that a legal framework is non-existent for coping with computer-related criminal acts. (For example, cases are cited where multimillion dollar computer-aided embezzlers received fines of $1000 and probation.) The book then examines proposed legislation to control computer crime and computer-related crimes in federal programs.

The author appropriately acknowledges the many computer scientists and computer-security specialists he consulted. In particular, he cites the cooperation of Donn B. Parker of Stanford Research International, a recognized expert in the field of computer abuse.

Although generally non-technical, the book does discuss in some detail the successful subversion within 13 seconds of the operating system of a Univac computer declared to be "secure." An entertaining book, it is recommended to anyone who has dealt with a bank or owns a credit card. It is a reading must for data processing managers, auditors, and prosecuting attorneys. Designers of "secure" operating systems would also benefit from reading Computer Capers.

Marvin Perlman Turpin Systems Co.

B78-25 Dimension PBX and Alternatives -- Nicholas Fiekowsky, et al.,

(Economics and Technology, Inc., Boston, Massachusetts, 1977, 178 pp.)

IEEE Computer Society, Sep 01, 1978 Page 1 IEEE Computer Volume 11 Number 9, Page 126

Page 2 of 2

IEEE Computer Volume 11 Number 9 -- BOOK REV...