The Virtual Bookcase : Shelf Computer security
Security of computer systems
Shelf parts : First Previous Next Last
Review:
The introduction states that while the book does cover foundational
encryption concepts, it is primarily intended to explain the
appropriate use of the PGP (Pretty Good Privacy) and GPG tools. This
preamble also provides a history and description of PGP, OpenPGP, and
GnuPG. The rudimentary outline is good, but does have some errors: an
ITAR (International Traffic in Arms Regulations) offence would be a
criminal (rather than civil) matter so the US government never did
launch a lawsuit against software author Phil Zimmermann (although
other lawsuits were launched surrounding the program), and the program
was produced before the book of the source code was published. (Lucas
also retails the myth that the NSA has a secret computer that can...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (2) and details of PGP & GPG: Email for the Practical Paranoid
Review:
Some forensics books provide a CD-ROM with (usually demo) versions of
computer forensic software. This one provides a DVD of log and other
forensic data, and points the reader to sites for open source tools
that can be used to explore it. Six "case studies," of fictitious
situations, have been provided, and are referred to at different times
and places within the book.
Part one ostensibly looks at response to an incident in real time.
Chapter one outlines tools that can be used for data capture and
analysis of various types on a Windows computer (associated with the
first "case"). There is rather limited explanation of the choices and
decisions involved (the authors make frequent mention that topics are
"beyond the scope" of this book...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Real Digital Forensics : Computer Security and Incident Response
Book descriptionAn introduction to the key tools and technologies used to secure network access * Examine common security vulnerabilities and the defenses used to protect network resources * Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates * Learn how to design, adopt, and enforce security policies * Evaluate the nuances of secure network design * Secure HTTP traffic by hardening operating systems, servers, and browsers * Protect routers through administrative access policies and services * Understand what firewalls do and how to implement them to maximum effect * Inspect and monitor network activity with IDS * Utilize VPNs for secure remote access * Learn about PKI technologies * Examine secure...
Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Network Security Fundamentals (Cisco Press Fundamentals Series)
Book descriptionA practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols). * Details what the risks on the internet are and how cryptography can help * Includes a chapter on interception which is unique amongst competing books in this field * Explains Public Key Infrastructures (PKIs) - currently the most important issue when using cryptography in a large organisation * Includes up-to-date referencing of peop...
Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Cryptography and Public Key Infrastructure on the Internet
Book description* Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003 * CISM is business-oriented and intended for the individual who must manage, design, oversee, and assess an enterprise's information security * Essential reading for those who are cramming for this new test and need an authoritative study guide * Many out-of-work IT professionals are seeking security management certification as a vehicle to re-employment * CD-ROM includes a Boson-powered test engine with all the questions and answers from the book
I want to add my review for this book!
Reviews (2) and details of The CISM Prep Guide : Mastering the Five Domains of Information Security Management
Shelf parts : First Previous Next Last