Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Stamp, Mark Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 5 reviews    
  Introduction to machine learning with applications in information security
Stamp M., Chapman & Hall/CRC, Boca Raton, FL, 2017. 364 pp.  Type: Book (978-1-138626-78-2)

Machine learning and information security are well-established disciplines that benefit mutually from their interaction because many modern network and system intrusion and prevention systems rely on advanced anomaly detection models i...
...
Jan 17 2018  
  Applied cryptanalysis: breaking ciphers in the real world
Stamp M., Low R., Wiley-Interscience, 2007. 401 pp.  Type: Book (9780470114865), Reviews: (2 of 2)

While reading this book, spooks and flashing black boxes from Hollywood movies may come to mind. If this happens, stop dreaming: the topic is indeed cryptanalysis, but to delve into it one must be ready for equations and puzzles, not f...
...
Oct 9 2007  
   Applied cryptanalysis: breaking ciphers in the real world
Stamp M., Low R., Wiley-Interscience, 2007. 401 pp.  Type: Book (9780470114865), Reviews: (1 of 2)

In his paper [1], Bruce Schneier mentions that “while there are several good books on cryptography, there are no books, good or bad, on cryptanalysis. It is a void that I don’t see being filled anytime soon....
...
Aug 14 2007  
  Information security: principles and practice
Stamp M., John Wiley & Sons, New York, NY, 2005. 416 pp.  Type: Book (9780471738480)

This introductory textbook on information security is made up of four sections. Section 1 deals with cryptography, section 2 is concerned with access control, section 3 is about protocols, and section 4 looks at software security. The ...
...
Jan 9 2006  
  Risks of monoculture
Stamp M. Communications of the ACM 47(3): 1202004.  Type: Article

This editorial piece is a fascinating extension of the organic virus metaphor for computer viruses. The author points out that just as biological organism populations are more vulnerable to virus attack if they lack genetic diversity, ...
...
Apr 6 2004  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy