Before reading the introduction, I decided to have a look into the preface, to my surprise, it started off with a sentence that I would have never expected to read before starting a book.
“I have written this book partly to correct a mistake.”
From there, it goes into how his first book “Applied Cryptology” didn’t direct people in the direction he wanted. Instead, it lead to “lesser” security systems around the world. More importantly however, he immediately states three points about the novel I am going to read about:
“This book is about those security problems, the limitations of technology and the solutions”
“Read this book, from beginning to end”
“Many technical books are meant to skim, bounce around in, and use as a reference. This book isn’t. It has a plot.”
In several senses, I was taken back, but lets just get straight to the point, shall we?
The introduction to the book first logs a number of security events during March 2000, whether they were defacing websites, security breaches, bugs or errors with software. This continues on for a bit before it his point becomes abundantly clear, that there are a multitude of problems and vulnerabilities in the software that is supposedly meant to be “secure”. He discusses in detail why and what can be done about the problem at hand, being the primary subject of his book.
Thus far, its been a fascinating book to read, and it really adds perception to the security in our world. It looks into detail about the underlying systems that go into creating the ‘security’ in our world, and how it seemingly may seem less secure then before.
Adobe Photoshop
apocalypse
Book
brain
cells
Chrome
Copyright
digital
Digital Immigrant
Digital Native
Education
Facebook
Fats Million
Firefox
Google
Image editing
Intellectual Property
ITGS
Jaron Lanier
Lawrence
Lawrence Lessig
Lessig
Marc Prensky
networks
of
people and machines
Photoshop
prensky
Privacy
Protocols
rat
Remix
robot
Schneier
scientist
Security
Spreadsheet
Trust
tweets
twitter
warcraft
world
wow
You Are Not A Gadget
YouTube Artificial Intelligence (36)
Arts Nd Entertainment (12)
Assignment (62)
Authenticity (11)
Blogroll (3)
Business/Employment (12)
Case Study (5)
Control (14)
Database (8)
Deadlines (4)
Delicious Links (212)
Education (28)
Equality (6)
Examinations (5)
Globalisation (14)
Health (10)
Integrity (8)
Intellectual Property (17)
IT Systems (37)
ITGS (982)
Just for Fun (36)
Models and Simulations (3)
People and Machines (45)
Policues and Standards (13)
Politics and Government (13)
Portfolios (5)
Presentation No Show (7)
Privacy (30)
Quiz (1)
Reliability (24)
Science Nd Environment (8)
Security (26)
Surveillance (4)
video (3)
Web 2.0 (13)
Wiki (2)
WP Cumulus Flash tag cloud by Roy Tanck and Luke Morton requires Flash Player 9 or better.
One Response
drtech
February 15th, 2010 at 8:48 am
1Nabsuh, can you keep your self publicity to a minimum with your banner being downgraded from gigantic to a smaller size?
Good intro – make sure you add depth to your reviews – including explanation of terms e.g. cryptography. And also always try to give some actual examples that the author uses as it makes it more interesting to the idle blogpost reader like myself.
RSS feed for comments on this post · TrackBack URI
Leave a reply