Sie sind auf Seite 1von 2

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/3282776

Secrets and lies: digital security in a networked world [Book Review]

Article  in  IEEE Network · December 2000


DOI: 10.1109/MNET.2000.885656 · Source: IEEE Xplore

CITATIONS READS

0 1,283

1 author:

Ioanis Nikolaidis
University of Alberta
203 PUBLICATIONS   1,152 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Fort McMurray Stony Mountain Plaza View project

Human Mobility and Location Privacy in Wireless Sensor Networks View project

All content following this page was uploaded by Ioanis Nikolaidis on 23 May 2014.

The user has requested enhancement of the downloaded file.


NEW BOOKS and MULTIMEDIA/Edited by Ioanis Nikolaidis

T h e New Books and Multimedia column contains brief architecture based on the remote procedure call (RPC), cur-
descriptions of new books in the computer communications rent architectures are distributed due to the availability of dis-
field. Each description has been abstracted from the pub- tributed object technologies and mobile agent technologies.
lisher's descriptive materials, minus most of the advertising The target audience is engineers and managers working on the
superlatives, after this material has been checked for accuracy deployment of telecommunications infrastructure and services,as
against a copy of the book. Publishers wishing to have their well as researchers in the particular area, with possible appeal
books listed in this manner should send copies and appropri- to researchersworkingin the area of activenetworks and open net-
ate advertising materials to John Spragins at the address work architectures and programming.
below, with an indication the books are intended for the IEEE
Network New Books and Multimedia column. Appropriate
books will be listed in the column. Understanding Internet Protocols Through
Zoanis Nikolaidis
Computing Science Department, Hunds-On Programming
University of Alberta, Edmonton, Alberta, Canada T6G 2Hl J. Mark Pullen, 2000, John Wiley & Sons, 0471-35626-3,
~~ ~~
286 pages, softcover, CD-ROM included
Mark Pullen's book is a fairly self-contained introductory
Object Oriented Software Technologies in book to the algorithms behind many Internet protocols. The
programs are executed on the Network Workbench (NW)
Telecommunications, From Theory to Practice which simulates the behavior of an Internet-like protocol stack.
lakovos Venieris, Fabriuio Ziua, and Thomas Magedanz, The book may be particularly appealing to instructors who wish
2000, John Wiley and Sons, 0-47142379-2,271 pages, to complement anundergraduate textbookwith abook that guides
hardcover students to try proof-of-conceptprojects in protocol programming.
One interesting side effect of European projects, such as the Slight changes in the project formulations allow the instructor
Advanced Communication Technologies and Services (ACTS) to provide a wider menu of possible programming tasks.
family of projects, is the eventual publication of a volume that Despite the fact that NW provides a simplified version of Inter-
describes the collective experience on a research topic from a net protocols (e.g., HDLC, OSPF, and TCP), it appears to be
varietyofviewpoints.The collectiveexperienceof the MobileAgent sufficient to illustrate the concepts behind each protocol. It is
Environments in Intelligent Networks (MARINE) project is fair to approach the book for its educationalvalue in understanding
described in a book that aims to bridge
theorywithpracticalaspectsof buildingpro-
grammable networks. The programma-
bility discussed in the bookrefers to any form
of programmabilitythat is possible through es: Digital Security in a Networked World
00, John Wiley & Sons, 0-471-2531 1-1,412 pages,
the incorporation of a middleware layer
(a software layer that hides the specifics I hardcover
of underlying hardware implementations information suggests that the Lorenz code, used to
but is also sufficient to provide primitives c traffic during World War 11, was cracked as a result of
that programmers find useful,e.g., message
passingprimitives).The other ingredient of
programmability is the adoption of open
interfaces andstandards. What middleware
should be composed of, and how it may
be implemented are the kinds of issues
the book addresses. The chapters are
split into three sections. The first section
argues about the need for advanced soft-
ware technologies.The second presents the
available software technologies. The final
sectiop details a case study for a dis-
tributed intelligent broadband network
architecture. While it is true that a book
of this type may force the reader into an
ocean of alphabet soup in acronyms from
both networking and softwareengineering,
the first two sections are readable with
little effort. In particular, the second sec-
tion reviews existing software technolo- thc level ofdctail and intcraction an author n c d s toprovidc t o make hiscasc. Schnei
gies and is useful to the newcomer in the
field. Namely, it presents object-oriented attackers and their
design methodologies, distributed object
technologies (CORBA in particular),
machine-independent code (Java and
MHEG), and finally, agents. Each-of the rs. providing jmt cnough information
software technologies in motivated in the
context of telecommunicationsapplications. in thc iritcrcst of the more advanced reader, for example,
The main argument is thatwhereas the intel-
ligent network concept was a centralized

IEEE Network NovemberDecember2000 3

View publication stats

Das könnte Ihnen auch gefallen