REVIEW: "Protected Internet, Intranet, and Virtual Private Networks", Alexander Moldovyan et al
- BKPIIVPN.RVW 20030404
"Protected Internet, Intranet, and Virtual Private Networks",
Alexander Moldovyan et al, 2003, 1-931769-14-1, U$44.95/C$67.95
%A Alexander Moldovyan
%A Nick Moldovyan
%A Doug Summerville
%A Vladimir Zima
%C 295 East Swedesford Road, PMB #285, Wayne, PA 19087
%I A-LIST LLC
%O U$44.95/C$67.95 fax 702-977-5377 mail@...
%P 310 p.
%T "Protected Internet, Intranet, and Virtual Private Networks"
Despite the slim size, it is still disconcerting to find that there
are only three chapters in this book. Chapter one provides an
introduction to client/server networking, while implying that the
technology is *not* hierarchical. Basic networking concepts are
covered, but the writing has an academic pomposity without the
requisite rigour. Figures and illustrations are not only unhelpful,
but may actually confuse issues, and typographical and grammatical
errors abound. Lists of idiosyncratic, and very odd, attack
taxonomies are given in chapter two. Items like "attacks on the
security policy and administration procedures" aren't really
explained, while "attacks on permanent components of the security
system" seems to be limited to cryptanalysis. Chapter three has some
descriptions of virtual private networks, tunnelling, IPSec, and key
The writing is hard to understand, there does not seem to be any
logical organization to the material, and the mistakes in the content
do not inspire any confidence in the reliability of any part of this
text. All the topics touched on here are covered much more
effectively in other works, but the topics are so random that it is
difficult to make specific recommendations. For those interested in
the basics of data communications I would suggest Tanenbaum (cf.
BKCMPNWK.RVW), while "Building Linux Virtual Private Networks (VPNs)"
(cf. BKBLVPNS.RVW) is a good introduction to VPNs themselves.
copyright Robert M. Slade, 2003 BKPIIVPN.RVW 20030404
rslade@... rslade@... slade@... p1@...
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
or mirror http://sun.soci.niu.edu/~rslade/
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
Security Educ.: http://groups.yahoo.com/group/comseced/
Review mailing list: send mail to email@example.com