Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Nair, Srijith
British Telecom
Amsterdam Zuid-Oost, Netherlands
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Srijith K. Nair is a senior security researcher at the Security Futures Practice of BT Innovate & Design, where he looks at security and privacy issues associated with cloud computing and system virtualisation. He has a PhD in computer science from Vrije Universiteit, Amsterdam. There, his work on distributed policy enforcement was supervised by Andrew S. Tanenbaum and Bruno Crispo. His other research interests include applied cryptography and general security and networking issues. He haspublished papers in several IEEE and ACM conference proceedings volumes.

Srijith received his MS degree in computer science from the National University of Singapore (NUS) in 2002, where he focused on the area of TCP congestion algorithms. He received his BTech (Electrical and Electronics Engineering) degree (with first class honors) from Nanyang Technological University, Singapore in 2000, under the Singapore Airlines-Neptune Orient Lines (SIA/NOL) undergraduate scholarship program. Before starting on his PhD quest, Srijith worked as a research and development engineer at JVC Asia Laboratories of Singapore (JALS) for a year, looking into digital video broadcasting multimedia home platform (DVB-MHP) issues.

Born and having spent most of his childhood in the beautiful tropical state of Kerala, India, Srijith finds the summer heat and winter snow of Europe amazing, and considers Europe a great travel paradise.

Srijith is member of the Institute of Electrical and Electronics Engineers (IEEE), the Association for Computing Machinery (ACM), and the ElectronicFrontier Foundation (EFF).

 
 
Options:
Date Reviewed  
 
1
- 10 of 11 reviews

   
   The Net delusion: the dark side of Internet freedom
Morozov E., Perseus Books, Cambridge, MA, 2011. 432 pp.  Type: Book (978-1-586488-74-1)

Evgeny Morozov, a journalist and social commentator, has written an important book on a topic that is on the mind of almost every technologically inclined social scientist: the power of the Internet to shape society, and the Internet&a...

Nov 4 2011  
   The future of the Internet--and how to stop it
Zittrain J., Yale University Press, New Haven, CT, 2008. 352 pp.  Type: Book (9780300124873), Reviews: (1 of 2)

Zittrain, a professor of Internet governance and regulation at Oxford University, has written a timely book: it looks at the state of the Internet as it is right now, as well as its potential to become, surprisingly enough, a closed sy...

Sep 8 2008  
  Computer science reconsidered: the invocation model of process expression (Pocket Your Problems)
Fant K., Wiley-Interscience, 2007. 269 pp.  Type: Book (9780471798149), Reviews: (1 of 2)

In his own words, Fant’s book can be summarized as a work that “provides the theoretical derivation for NULL Convention Logic, which was presented in my previous book” [1]....

Jan 18 2008  
   Play money: or, how I quit my day job and made millions trading virtual loot
Dibbell J., Basic Books, Inc., New York, NY, 2006. 321 pp.  Type: Book (9780465015351)

Have you ever wondered about the virtual worlds that seem to be popping up all around us? Completely invisible to the ignorant, yet omnipresent to the insiders, virtual worlds are no longer a figment of science fiction. There are many ...

Apr 27 2007  
  The wisdom of crowds
Surowiecki J., Anchor, New York, NY, 2005. 336 pp.  Type: Book (9780385721707), Reviews: (2 of 2)

Surowiecki’s now-famous book examines one central question: Is a group “smarter than the smartest people in [it]?” If Surowiecki’s claim is to be believed, the crowd is indeed sma...

Jul 7 2006  
  Security and usability
Cranor L., Garfinkel S., O’Reilly Media, Inc., Sebastopol, CA, 2005. 714 pp.  Type: Book (9780596008277)

From previous experience, every time I decide to review a book that is a collection of papers, I am prepared to be disappointed. However, this collection pleasantly surprised me, not just with the quality and the coverage of the papers...

Jul 6 2006  
   The art of computer virus research and defense
Szor P., Addison-Wesley Professional, Boston, MA, 2005. 744 pp.  Type: Book (9780321304544), Reviews: (2 of 2)

When someone as knowledgeable about computer viruses as Symantec’s chief antivirus researcher writes a book on the subject, it is expected that the resulting work will be authoritative; Peter Szor’s work is that and...

Jun 21 2006  
  The best software writing I: selected and introduced by Joel Spolsky
Spolsky J., APress, LP, Berkeley, CA, 2005. 328 pp.  Type: Book (9781590595008), Reviews: (1 of 2)

This book is a collection of material, mainly short articles, but also cartoons and conference keynotes, that revolves around the theme of programming and software project management. Selected and introduced by Joel Spolsky, an influen...

Sep 8 2005  
   Network security hacks
Lockhart A., O’Reilly & Associates, Inc., Sebastopol, CA, 2004.  Type: Book (9780596006433)

To begin with, I’d like to offer a word of advice to prospective readers: if you are considering reading this book as a means of finding out easy ways to penetrate a system or network, this is not the book for you. This b...

Jun 9 2005  
   Secrets and lies: digital security in a networked world
Schneier B., John Wiley & Sons, 2004.  Type: Book (9780471453802)

“Security is a process, not a product.” If one sentence could sum up the content of this book, this would be it. Bruce Schneier, the author of the popular book Applied cryptography [1], takes a U-turn in his ...

Feb 2 2005  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy