IEEE Cipher Book Reviews
Issue E35. 1/21/00
Anonymous, Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation. Review by Bob Bruen
Li Gong, Inside Java 2 Platform Security. Architecture, API Design, and Implementation. Review by Bob Bruen
Issue E34. 11/3/99
Simon Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Review by Bob Bruen
William Stallings, Cryptography and Network Security: Principles and Practice, 2nd Edition. Review by Bob Bruen
Rudolf Kippenhahn, Code Breaking: A History and Exploration. Review by Bob Bruen
Issue E33. 8/12/99
Brian Tung, Kerberos: A Network Authentication System. Review by Bob Bruen
Issue E32 6/7/99
Ross Anderson, The Global Internet Trust Register, 1999 Edition. Review by Bob Bruen
Geoff Mulligan, Removing the Spam: Email Processing and Filtering. Review by Bob Bruen
Issue E31 3/15/99
Dorothy Denning, Information Warfare. Review by Bob Bruen
Dorothy Denning and Peter Denning, Editors, Internet Besieged Countering Cyberspace Scofflaws. Review by Bob Bruen
Issue E30 12/18/98
Terry Escamilla, Intrusion Detection: Network Security Beyond the Firewall. Review by Bob Bruen
Carolyn Meinel, The Happy Hacker. Review by Bob Bruen
Alan Schwartz and Simson Garfinkel, Stopping Spam. Review by Bob Bruen
Issue E29 10/7/98
Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. Review by Bob Bruen
Issue E28 7/13/98
Gary McGraw and Edward Felten, Java Security. Review by Bob Bruen
Jonathan Knudsen, Java Cryptography. Review by Bob Bruen
Martin Freiss, Protecting Networks With Satan. Review by Bob Bruen
Scott Oaks, Java Security. Review by Bob Bruen
Charles Scott, Paul Wolfe & Mike Erwin, Virtual Private Network. Review by Bob Bruen
Issue E27 4/27/98
Lincoln Stein, Web Security: A Step-By-Step Reference Guide. Review by Bob Bruen
Issue E26 2/9/98
Whitfield Diffie and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption. Review by Bob Bruen
Anonymous, Maximum Security: A Hacker's Guide to Protecting Your Internet Site. Review by Bob Bruen
Issue E25 11/25/97
Philip E. Agre and Marc Rotenberg (eds), Technology and Privacy: The New Landscape. Review by Bob Bruen
Rita Summers, Secure Computing, Threats, and Safeguards. Review by Bob Bruen
Issue E22 7/12/97
Kenneth Birman, Building Secure and Reliable Network Applications. Review by Bob Bruen
Issue E20 2/10/97
Hans Reisel, Prime Numbers and Computer Methods for Factorization. 2nd Edition. Review by Bob Bruen
Paulo Ribenboim, The New Book of Prime Number Records, 3rd Edition. Review by Bob Bruen
Issue E19 12/23/96
Peter Wayner, Disappearing Cryptography. Review by Bob Bruen
Douglas Stinson, Cryptography: Theory and Practice. Review by Bob Bruen
David Kahn. The Codebreakers. The Story of Secret Writing. Review by Bob Bruen
Norman Polmar and Thomas Allen, Spy Book: The Encyclopedia of Espionage. Review by Bob Bruen
Issue E18 11/11/96
Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security: Private Communication in a Public World. Review by Bob Bruen
William Stallings, Network and Internetwork Security: Principles and Practice. Review by Bob Bruen