Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Synchronizing Internet protocol security (SIPsec) (Advances in Information Security)
Shoniregun C., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 223 pp. Type: Book (9780387327242)
Date Reviewed: Nov 9 2007

This is the second book I have reviewed by this author. As with the previous book, this one has the organization and feel of an extended research paper. It discusses what the author refers to as synchronizing Internet protocol security (SIPSec). It is difficult to identify a single audience for the book, as some sections and chapters are too basic for advanced readers, and other chapters are too brief for novice readers. For example, Section 2 of chapter 2 unnecessarily describes the transmission control protocol/Internet protocol (TCP/IP) suite. On the other hand, the main topic of the book, SIPSec, is only covered in a few pages. Therefore, this book is not recommended for a course, but might prove compelling to those interested in the author’s research (although the research is not covered in sufficient detail). In essence, the author proposes combining biometric identification with IPSec, but leaves out the technical details.

The book is organized into seven chapters. Chapter 1 discusses IPSec and gives an overview of the research. Chapter 2 discusses TCP/IP and the Open Systems Interconnection (OSI) model. It also covers the IPSec standard and its different modes. Chapter 3 focuses on Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6), highlighting their differences. Chapter 4 discusses the different implementations of IPSec under different operating systems, and how to configure them. In chapter 5, the author directly addresses the topic of the book, SIPSec. He justifies his recommendations based on surveys, case studies, and laboratory experiments—none of which are presented in detail. This chapter also briefly discusses the different biometric identification techniques and their limitations. Chapter 6 repeats many of the topics already covered. The book concludes with chapter 7. Each chapter ends with a poorly written summary.

The author has researched the topic well, as evidenced by the numerous citations and references. However, the book’s coverage is mostly superficial. It contains numerous spelling and grammatical errors, and is poorly organized; the focus shifts several times in each chapter. In addition, many statements and ideas are repeated too often. Many of the book’s ideas could have been more concisely and clearly presented.

Reviewer:  Imad H. Elhajj Review #: CR134915 (0811-1029)
Bookmark and Share
 
Protocol Verification (C.2.2 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
 
Network Protocols (C.2.2 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Protocol Verification": Date
Design and validation of computer protocols
Holzmann G. (ed), Prentice-Hall, Inc., Upper Saddle River, NJ, 1991. Type: Book (9780135399255)
Jul 1 1992
Improving round-trip time estimates in reliable transport protocols
Karn P., Partridge C. ACM Transactions on Computer Systems 9(4): 364-373, 1991. Type: Article
Aug 1 1992
Algebraic specification and verification of communication protocols
Koomen C. Science of Computer Programming 5(1): 1-36, 1985. Type: Article
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy