The Virtual Bookcase : Shelf Privacy
Your privacy, protecting it through encryption, the law.
Shelf parts : First Previous Next Last
Review:
The preface states that the intended reader is the technical lead for
the protection of information in a database. This person should be
well familiar with databases, and have a passing knowledge of
cryptography.
Part one deals with database security. Chapter one states that
databases are important, and we should protect them. A brief review
of database concepts (limited to relational databases) and a rather
longer, and quite complete, overview of cryptography, is in chapter
two.
Part two outlines a cryptographic infrastructure. Chapter three
examines keys and key management. Algorithms, and symmetric block
algorithm modes, are covered in chapter four. More of key management
is addressed in chapter five. Chapter six looks at the l...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Cryptography in the Database : The Last Line of Defense
Review:
The preface states that this book should help people learn about
privacy technologies. (The cover refines this: it contains what
developers and information technology professionals should know.)
Part one examines privacy for everyone. Chapter one is a vague review
of privacy. A list of privacy related technologies is in chapter two.
There is a brief look, in chapter three, at privacy lawsuits and
legislation. Chapter four discusses privacy settings in Windows,
including the metadata in Word files. Spam, and anti-spam
technologies, are surveyed in chapter five. Privacy invasive
technologies are examined in chapter six, concentrating on radio-
frequency identity chips.
Part two looks at privacy and the organization. Chapter seven
s...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Privacy : What Developers and IT Professionals Should Know
Review:
The introduction states that while the book does cover foundational
encryption concepts, it is primarily intended to explain the
appropriate use of the PGP (Pretty Good Privacy) and GPG tools. This
preamble also provides a history and description of PGP, OpenPGP, and
GnuPG. The rudimentary outline is good, but does have some errors: an
ITAR (International Traffic in Arms Regulations) offence would be a
criminal (rather than civil) matter so the US government never did
launch a lawsuit against software author Phil Zimmermann (although
other lawsuits were launched surrounding the program), and the program
was produced before the book of the source code was published. (Lucas
also retails the myth that the NSA has a secret computer that can...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (2) and details of PGP & GPG: Email for the Practical Paranoid
Shelf parts : First Previous Next Last