Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Protected Internet, Intranet, and Virtual Private Networks", Alexander Moldovyan et al

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKPIIVPN.RVW 20030404 Protected Internet, Intranet, and Virtual Private Networks , Alexander Moldovyan et al, 2003, 1-931769-14-1, U$44.95/C$67.95 %A
    Message 1 of 1 , May 20, 2003
    • 0 Attachment
      BKPIIVPN.RVW 20030404

      "Protected Internet, Intranet, and Virtual Private Networks",
      Alexander Moldovyan et al, 2003, 1-931769-14-1, U$44.95/C$67.95
      %A Alexander Moldovyan
      %A Nick Moldovyan
      %A Doug Summerville
      %A Vladimir Zima
      %C 295 East Swedesford Road, PMB #285, Wayne, PA 19087
      %D 2003
      %G 1-931769-14-1
      %I A-LIST LLC
      %O U$44.95/C$67.95 fax 702-977-5377 mail@...
      %O http://www.amazon.com/exec/obidos/ASIN/1931769141/robsladesinterne
      http://www.amazon.co.uk/exec/obidos/ASIN/1931769141/robsladesinte-21
      %O http://www.amazon.ca/exec/obidos/ASIN/1931769141/robsladesin03-20
      %P 310 p.
      %T "Protected Internet, Intranet, and Virtual Private Networks"

      Despite the slim size, it is still disconcerting to find that there
      are only three chapters in this book. Chapter one provides an
      introduction to client/server networking, while implying that the
      technology is *not* hierarchical. Basic networking concepts are
      covered, but the writing has an academic pomposity without the
      requisite rigour. Figures and illustrations are not only unhelpful,
      but may actually confuse issues, and typographical and grammatical
      errors abound. Lists of idiosyncratic, and very odd, attack
      taxonomies are given in chapter two. Items like "attacks on the
      security policy and administration procedures" aren't really
      explained, while "attacks on permanent components of the security
      system" seems to be limited to cryptanalysis. Chapter three has some
      descriptions of virtual private networks, tunnelling, IPSec, and key
      management protocols.

      The writing is hard to understand, there does not seem to be any
      logical organization to the material, and the mistakes in the content
      do not inspire any confidence in the reliability of any part of this
      text. All the topics touched on here are covered much more
      effectively in other works, but the topics are so random that it is
      difficult to make specific recommendations. For those interested in
      the basics of data communications I would suggest Tanenbaum (cf.
      BKCMPNWK.RVW), while "Building Linux Virtual Private Networks (VPNs)"
      (cf. BKBLVPNS.RVW) is a good introduction to VPNs themselves.

      copyright Robert M. Slade, 2003 BKPIIVPN.RVW 20030404

      --
      ======================
      rslade@... rslade@... slade@... p1@...
      "If you do buy a computer, don't turn it on." - Richards' 2nd Law
      ============= for back issues:
      [Base URL] site http://victoria.tc.ca/techrev/
      or mirror http://sun.soci.niu.edu/~rslade/
      CISSP refs: [Base URL]mnbksccd.htm
      Security Dict.: [Base URL]secgloss.htm
      Security Educ.: [Base URL]comseced.htm
      Book reviews: [Base URL]mnbk.htm
      [Base URL]review.htm
      Partial/recent: http://groups.yahoo.com/group/techbooks/
      Security Educ.: http://groups.yahoo.com/group/comseced/
      Review mailing list: send mail to techbooks-subscribe@egroups.com
    Your message has been successfully submitted and would be delivered to recipients shortly.