The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Privacy

Your privacy, protecting it through encryption, the law.

Shelf parts : First Previous Next Last score: 4.0 ++++-
Vote for this book

Shop for this book
According to the preface, this book is aimed at non-specialists who need to know just enough about cryptography to make informed technical decisions. As an example, Smith suggests systems administrators and managers who, while not formally charged with security, still have to use cryptographic techniques to secure their networks or transmissions. Chapter one is an introduction, contrasting what we want; secure communications; with the environment we have to work in; a wide open Internet. The text also looks at the balance that must be maintained between convenience and requirements. Encryption basics, in chapter two, presents the concepts of symmetric cryptography, use, and choice. There is a clear explanation of the ideas without ove... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (2) and details of Internet Cryptography

Shop for this book
When certain technical people find out that I am involved in data security, they assert an interest in cryptography, and an intention to write a cryptographic program sometime. While I not wish to disparage this goal, questioning of the individual's background in mathematics tends to point out that the task is harder than they might have foreseen. The magic phrase "number theory" is usually the dividing line. For those who make it past that limit, I am going to recommend that they get Koblitz's work. Not that I am implying that this book is more demanding than it needs to be: only that the topic itself is a difficult one. This is the heart of cryptology: the underlying foundations that make it work. The material presented does not ad... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (2) and details of Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics, Vol 3) score: 5.0 +++++
Vote for this book

Shop for this book
The full history of modern computer cryptography. Includes the complete story of breakthroughs like asymmetric encryption which enables a lot of modern security. And the story of the relaxation of the export regulations, which worked against US companies for years. A great book to read, putting all the credit with the right names (for as far as possible with part of the research being classified). I am quite a fan of Steven Levy and this book was no disappointment.
(Review by Koos van den Hout)
I want to add my review for this book!
Reviews (2) and details of Crypto : How the Code Rebels Beat the Government -- Saving Privacy in the Digital Age

Shop for this book
Book description
In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence of governance structures within online communities and the visions of political sovereignty shaping some of those communities. Ludlow views virtual communities as laboratories for conducting experiments in the construction of new societies and governance structures. While many online experiments will fail, Ludlow argues that given the synergy of th... Rest of this review on the detail page
I want to add the first review for this book!
Reviews (1) and details of Crypto Anarchy, Cyberstates, and Pirate Utopias
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement