The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

The Virtual Bookcase : Shelf Privacy

Your privacy, protecting it through encryption, the law.

Shelf parts : First Previous Next Last


Shop for this book
Amazon.com
Amazon.co.uk
Book description
RFID, which stands for Radio Frequency IDentification, is a technology that uses computer chips smaller than a grain of sand to track items from a distance. And as this mind-blowing book explains, plans and efforts are being made now by global corporations and the U.S government to turn this advanced technology, these spychips, into a way to track our daily activities-and keep us all on Big Brother's short leash. Compiling massive amounts of research with firsthand knowledge, Spychips explains RFID technology and reveals the history and future of the master planners' strategies to imbed these trackers on everything-from postage stamps to shoes to people themselves-and spy on Americans without our knowledge or consent. It also urgently encou... Rest of this review on the detail page
I want to add the first review for this book!
Reviews (1) and details of Spychips : How Major Corporations and Government Plan to Track Your Every Move with RFID

Shop for this book
Amazon.com
Amazon.co.uk
Review:
The preface states that the intended reader is the technical lead for the protection of information in a database. This person should be well familiar with databases, and have a passing knowledge of cryptography. Part one deals with database security. Chapter one states that databases are important, and we should protect them. A brief review of database concepts (limited to relational databases) and a rather longer, and quite complete, overview of cryptography, is in chapter two. Part two outlines a cryptographic infrastructure. Chapter three examines keys and key management. Algorithms, and symmetric block algorithm modes, are covered in chapter four. More of key management is addressed in chapter five. Chapter six looks at the l... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Cryptography in the Database : The Last Line of Defense
virtualbookcase.com score: 4.0 ++++-
Vote for this book

Shop for this book
Amazon.com
Amazon.co.uk
Review:
The preface states that this book should help people learn about privacy technologies. (The cover refines this: it contains what developers and information technology professionals should know.) Part one examines privacy for everyone. Chapter one is a vague review of privacy. A list of privacy related technologies is in chapter two. There is a brief look, in chapter three, at privacy lawsuits and legislation. Chapter four discusses privacy settings in Windows, including the metadata in Word files. Spam, and anti-spam technologies, are surveyed in chapter five. Privacy invasive technologies are examined in chapter six, concentrating on radio- frequency identity chips. Part two looks at privacy and the organization. Chapter seven s... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Privacy : What Developers and IT Professionals Should Know

Shop for this book
Amazon.com
Amazon.co.uk
Review:
The introduction states that while the book does cover foundational encryption concepts, it is primarily intended to explain the appropriate use of the PGP (Pretty Good Privacy) and GPG tools. This preamble also provides a history and description of PGP, OpenPGP, and GnuPG. The rudimentary outline is good, but does have some errors: an ITAR (International Traffic in Arms Regulations) offence would be a criminal (rather than civil) matter so the US government never did launch a lawsuit against software author Phil Zimmermann (although other lawsuits were launched surrounding the program), and the program was produced before the book of the source code was published. (Lucas also retails the myth that the NSA has a secret computer that can... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (2) and details of PGP & GPG: Email for the Practical Paranoid
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2017 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement