The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

Book details of 'Internet Cryptography'

Cover of Internet Cryptography
TitleInternet Cryptography
Author(s)Richard E. Smith
ISBN0201924803
LanguageEnglish
PublishedJanuary 1997
PublisherAddison-Wesley Pub Co
Web links for this book
Search at Bookcrossing.com
Wikipedia booksources
Shop for this book
At Amazon.com
At Amazon.co.uk

Back to shelf Computer networks
Back to shelf Privacy
Amazon.com info for Internet Cryptography

Score:

virtualbookcase.com score: 4.0 ****-  Vote for this book

The Virtual Bookcase Reviews of 'Internet Cryptography':

Reviewer Rob Slade wrote:
According to the preface, this book is aimed at non-specialists who need to know just enough about cryptography to make informed technical decisions. As an example, Smith suggests systems administrators and managers who, while not formally charged with security, still have to use cryptographic techniques to secure their networks or transmissions. Chapter one is an introduction, contrasting what we want; secure communications; with the environment we have to work in; a wide open Internet. The text also looks at the balance that must be maintained between convenience and requirements. Encryption basics, in chapter two, presents the concepts of symmetric cryptography, use, and choice. There is a clear explanation of the ideas without overwhelming technical details. (It is interesting to note how quickly the cryptographic technology changes: SKIPJACK and ITAR were still important when the book was written, and are now basically irrelevant.) Some random thoughts on network implementation of encryption are given in chapter three. Managing secret keys, in chapter four, provides good conceptual coverage of generation and management, although the discussion of the problems of key escrow is weak. Because of the requirements for technical details when discussing protocols, chapter five, on IPSec, is different from other material in the book. It also includes a brief mention of other protocols. Chapter six discusses the use of IPSec in virtual private networks, while seven examines IPSec in terms of remote access. Chapter eight looks at IPSec in relation to firewalls, but it is difficult to see how this would be used in an actual application. Chapter nine reviews public key encryption and SSL (Secure Sockets Layer). The basic concepts of asymmetric cryptography are presented well, but may be unconvincing due to the lack of mathematical support and details. While there is an introduction to the idea of digital signatures, but SSL is really only mentioned. World Wide Web transaction security, in chapter ten, provides practical examples of the technologies discussed. The same is true of email, in chapter eleven, but digital signatures get a bit more explanation. Chapter twelve builds on the signature concept to introduce PKI (Public Key Infrastructure) notions. The fundamentals are written clearly and well, and are quite suitable for managers and users. Despite the lack of detail, the text may even be suitable for some security professionals who need a rough background without needing to work with the technology itself. The work is easy to read, although the idiosyncratic structure may be confusing, and the value of some chapters questionable. copyright Robert M. Slade, 2002
Reviewer amazon.com wrote:
For all the talk about the Internet's very real security weaknesses, information safety is not all that difficult to achieve. Yes, most Internet technology does a better job of making information accessible than it does of protecting privacy. Still, modern cryptographic products and techniques have made more than adequate security available to just about anyone who needs it. In Internet Cryptography, network security consultant Richard Smith explains the basics of online security. He avoids getting technical with too much cryptographic theory or the mathematics behind the magic. Instead he focuses on providing just enough information to enable information systems managers and administrators to make wise decisions. In fact, Smith pays close attention to matters of system configuration and operation, showing how even the best encryption methods can be ruined by careless operation. From there, Smith explains how today's techniques can protect information from being forged, altered, or stolen. Smith devotes most of his discussion of various cryptographic options to products that are presently on the market. Therefore, the techniques he describes are generally within the reach of most businesses and organizations. He progresses from the simplest to most complex approach, examining the strengths and weaknesses of each. As a result, readers wind up with a solid understanding of cryptographic security as well as a good feel for the level of security they require.
Add my review for Internet Cryptography
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2017 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement