Gregory D. Evans - "Laptop Security Short & Simple" 32% or More Plagiarized

Sun Feb 13 01:35:17 CST 2011

The book "Laptop Security Short & Simple" is published by LIGATT Publishing (ISBN 0974561126), in other words self published by Gregory D. Evans. It did not enjoy the benefit of an editor or technical editor as evident by frequent misspellings and botched cut/paste clips from other sources. There are several portions of the book that stand out, as the repeated text and hastily interrupted text makes it clear that the author was using cut and paste, not writing his own material. This, along with a noted history of plagiarism, lead attrition.org staff to examine this book more carefully.

Our review is not entirely thorough. Most pages were spot checked for plagiarism, but once it was detected we moved to the next page or chapter. Our findings indicate at least 32% of this book has been plagiarized from a wide variety of public sources including books, online magazines and other sources. A more detailed review of the book may discover more material that was plagiarized.

The Plagiarism

The following table details the portions of the book that were taken from other sources, making up at least 32% of the material. Information is included so that anyone with a copy of the book can validate our findings that the author committed willful infringement of copyright and outright plagiarism.

Pages / total Description Original Source
5-12 Introduction, 15 articles or quotes from news papers or surveys. Sources cited, but used verbatim. The Register, USA Today, STL Today, AP, Mainichi Interactive, etc.
18-19 Introduction, 3 paragraphs on John Boyd and concluding paragraph Secrets of Computer Espionage, by Joel McNamara
28-34 Chapter 2, Computer Theft Statistics, Charts from the 2001 CSI/FBI Security Survey (physical copy in archive) Copyright The Computer Security Institute, All Rights Reserved
35-36 Chapter 2, Computer Theft Statistics, BSI Computer Theft Survey Results Executive Summary: Key findings of the 2003 BSI Computer Theft Survey (C) Brigadoon Software, Inc.
Book says for complete survey, go to www.pcphonehome.com (Evans' site, not Brigadoon's)
55 Chapter 7, Physical Security Devices, 2nd paragraph Wireless Security by Merritt Maxim, David Pollino
60-65 Chapter 8, Surge Protection, FAQ and information on Surge Protectors Lowe's Guide: Buying a Surge Protector
67-68 Chapter 9, Threatening Your Network, all 4 paragraphs (entire chapter) Find Those Rogues by Leon Erlanger, PCWorld
70 Chapter 10, Wireless Security, 2nd/3rd/5th/6th paragraphs Wireless Security by Merritt Maxim, David Pollino
Note: 6th paragraph has obvious cut/paste mistake, as it was taken out of a larger paragraph.
78 Chapter 12, Password Protection, 6 Guidelines for choosing a password (3 of 6) Complete Hacker's Handbook, Chapter 13
90 Chapter 15, Personal Firewalls, 2nd/3rd paragraphs Personal Firewalls for Administrators and Remote Users, by Lisa Yeo
92-93 Chapter 16, Viruses and Worms, 1st - 6th paragraphs Computer Crime: A Crimefighter's Handbook, Chapter 2, by David Icove, Karl Seger & William VonStorch (O'Reilly)
94 Chapter 16, Anti-Virus Tools, first 3 sentences Attack of the Clones, by Lea Goldman (Forbes)
95-96 Chapter 16, Anti-Virus Tools, "step-by-step look at how anti-virus software works" (5 paragraphs) How Antivirus Software Works, by Dana Montey and Ned Day
102 Chapter 18, Internet Security, 'Cookies' (1 paragraph) Building Internet Firewalls, by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
106 Chapter 19, Instant Messaging, 1st para (first half) Alliance Course List - Instant Messaging
106 Chapter 19, Instant Messaging, 1st para (second half) "H-P, AOL team on instant messenger", by Paul Davidson (USA Today)
106-107 Chapter 19, Instant Messaging, 5 paragraphs "Viruses Target IM", by Liane Cassavoy
110-114 Chapter 20, Spyware and Adware, several sentences verbatim from multiple sources "The courts have affirmed the company's right to.." "Companies have their choice of monitoring.." (PCMag)
"According to a report from research firm Gartner.." (NZ Business)
"The command line Attrib utility.." "Check for sudden.." (PCMag)
137-139 Chapter 28, Security Checklist, "company security checklist" Computer Crime: A Crimefighter's Handbook, by David J. Icove, Karl A. Seger, William VonStorch (O'Reilly)
146 Chapter 29, Laptop Security Policies, 1st/2nd paragraph Computer Security: Protecting Digital Resources, by Robert C. Newman
149-150 Chapter 29, Laptop Security Policies, Laptop Security Policy Kensington Indonesia
152-154 Chapter 30, PDA Security, 7 paragraphs "Simple Mobile Security for Paris Hilton!" by Lance Ulanoff (PCMag)
154-158 Chapter 30, PDA Security, 15 paragraphs "PDA Security 101" by Laura Taylor (Intranet Journal)
160 Chapter 31, Conclusion, 4/8 bullets "It's 10:00 PM: Do You Know Where Your Laptop Is?"


Total Pages with Plagiarised Content
~ 57 / 179 (32%)