Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Nair, Srijith
British Telecom
Amsterdam Zuid-Oost, Netherlands
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Srijith K. Nair is a senior security researcher at the Security Futures Practice of BT Innovate & Design, where he looks at security and privacy issues associated with cloud computing and system virtualisation. He has a PhD in computer science from Vrije Universiteit, Amsterdam. There, his work on distributed policy enforcement was supervised by Andrew S. Tanenbaum and Bruno Crispo. His other research interests include applied cryptography and general security and networking issues. He has published papers in several IEEE and ACM conference proceedings volumes.

Srijith received his MS degree in computer science from the National University of Singapore (NUS) in 2002, where he focused on the area of TCP congestion algorithms. He received his BTech (Electrical and Electronics Engineering) degree (with first class honors) from Nanyang Technological University, Singapore in 2000, under the Singapore Airlines-Neptune Orient Lines (SIA/NOL) undergraduate scholarship program. Before starting on his PhD quest, Srijith worked as a research and development engineer at JVC Asia Laboratories of Singapore (JALS) for a year, looking into digital video broadcasting multimedia home platform (DVB-MHP) issues.

Born and having spent most of his childhood in the beautiful tropical state of Kerala, India, Srijith finds the summer heat and winter snow of Europe amazing, and considers Europe a great travel paradise.

Srijith is member of the Institute of Electrical and Electronics Engineers (IEEE), the Association for Computing Machinery (ACM), and the Electronic Frontier Foundation (EFF).

 
 
Options:
Date Reviewed  
 
1
- 10 of 39 reviews

   
   Cyber security and the politics of time
Stevens T.,  Cambridge University Press, New York, NY, 2015. 280 pp. Type: Book (978-1-107109-42-1)

As the pervasiveness and ubiquity of networked computers increase, so does fear over the abuse of power provided by these networked systems. A lot of work has been done in recent years on the concept of cyber security, centered around protecting c...

Jul 12 2016  
   Cyber warfare: a multidisciplinary analysis
Green J.,  Routledge, New York, NY, 2015. 196 pp. Type: Book (978-1-138793-07-1), Reviews: (1 of 2)

This book provides a much-needed discourse around the complex subject of cyber warfare. Providing a wide-ranging, grounded, and comprehensive discussion on various topics related to cyber warfare, anyone who wishes to gain a deeper understanding o...

Dec 10 2015  
   The Net delusion: the dark side of Internet freedom
Morozov E.,  Perseus Books, Cambridge, MA, 2011. 432 pp. Type: Book (978-1-586488-74-1)

Evgeny Morozov, a journalist and social commentator, has written an important book on a topic that is on the mind of almost every technologically inclined social scientist: the power of the Internet to shape society, and the Internet’s role ...

Nov 4 2011  
   Cyber war: the next threat to national security and what to do about it
Clarke R., Knake R.,  HarperCollins, New York, NY, 2010. 304 pp. Type: Book (978-0-061962-23-3)

The argument that international warfare can be carried out in cyberspace has been evaluated by many as warmongering. This book aims to counter those opinions by providing anecdotal evidence that cyber war is not only a distinct possibility, but th...

Oct 28 2010  
   Cyberpower and national security
Kramer F., Starr S., Wentz L.,  Potomac Books Inc., Washington, D.C., 2009. 642 pp. Type: Book (9781597974233)

US President Barack Obama recently announced that America’s digital infrastructure is a “strategic national asset,” and set up a new Cyber Command headed by the director of the National Security Agency....

Oct 1 2010  
   Inside cyber warfare: mapping the cyber underworld
Carr J.,  O’Reilly Media, Inc., Sebastopol, CA, 2009. 240 pp. Type: Book (978-0-596802-15-8)

Most books on cyber warfare look at the subject area from a purely technical perspective. This book’s coverage of the macro issues associated with cyber war--including international law, involvement of organized crime, and state machine...

Jun 3 2010  
  Bricklin on technology
Bricklin D.,  Wiley Publishing, Indianapolis, IN, 2009. 512 pp. Type: Book (9780470402375)

Dan Bricklin gave us VisiCalc, the first spreadsheet program for personal computers. A leading thinker and visionary, he has been at the forefront of several technology domains. Most, if not all, of this book is available online, as blog posts or ...

Nov 20 2009  
  Beautiful security
Oram A. (ed), Viega J. (ed),  O’Reilly Media, Inc., Sebastopol, CA, 2009. 300 pp. Type: Book (9780596527488)

This book hopes to change the common view that security research is boring: “It will show that security is about the most exciting career you can have. It is not tedious, not bureaucratic, and not constraining.” With contributions from...

Sep 30 2009  
  The annotated Turing: a guided tour through Alan Turing’s historic paper on computability and the Turing machine
Petzold C.,  Wiley Publishing, 2008. 384 pp. Type: Book (9780470229057), Reviews: (2 of 2)

This book is an attempt by Petzold to make Turing’s seminal paper, “On computable numbers, with an application to the Entscheidungsproblem” [1], accessible to ordinary readers; it has indeed turned out to be a successful attempt....

May 15 2009  
  Security engineering: a guide to building dependable distributed systems
Anderson R.,  Wiley Publishing, 2008. 1080 pp. Type: Book (9780470068526)

Few books on the broad subject of security engineering have achieved the seminal status of this one, first published in 2001 [1]. The first edition is available for free online (http://www.cl.cam.ac.uk/~rja14/book.html). The second edition adds ov...

Feb 6 2009  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy