- Shopping Bag ( 0 items )
Posted March 1, 2013
Posted May 22, 2012
Solid reference for security practitioners
I picked up this volume at a Security User Group meeting. As a networking professional and a CISSP I found it to be a solid security reference, especially on crypto topics. This book is conveniently organized in five parts, allowing one easily to focus on the broader subject of interest, with the chapters offering further granularity. Each of the book’s nineteen chapters concludes with further recommended readings and references to pertinent websites, a list of key terms used throughout the chapter, review questions, and problems. The review questions are helpful to test one’s comprehension of the contents. The recap of key terms along with the additional reading & website references are a solid study aid. I don’t plan, however, to solve and/or code all of the problems from each chapter. That’s for a different audience, perhaps the undergraduates in Computer Science and Engineering using this volume as a textbook. It seems to me that the author targets multiple audiences with this work, which is a thankless task. Reviews are likely to vary widely. For a practitioner responsible for implementing security solutions, as opposed to coding and developing products that utilize the crypto algorithms and security protocols, this is a solid reference. Also, if you are prepping for any of the various security certifications, consider this volume as a summary as well as detailed reference on cryptography. Thank you Mr. Stallings for another fine contribution to the field of networking and computer security!Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted January 13, 2010
No text was provided for this review.