Monday,
July 28, 2003 |
|
Book
Review |
|
Author’s
reassurance sets this book apart
Review by Ali Hasnain
Cryptography and Network Security
by Atul Kahate. Tata McGraw-Hill. Price Rs. 250. Pages 435
CRYPTOGRAPHY
and Network Security is another
feather in the cap of the publishers, given the mark they have made for
themselves in providing reliable and comprehensive guides and references
for students and teachers alike.
Atul Kahate (the author)
has done a commendable job of demystifying Internet security concepts
and has brought forth in his own unique style the whole gamut of
information to better serve the curiosity of the student without in any
way compromising on the quality and content of the work and thereby
insuring that the book’s relevance is not lost to the hardcore IT
professional. Atul’s expertise reflects in his simple and lucid
explanations of what would otherwise be rather difficult propositions to
grasp, especially for the student. Self-explanatory diagrams have been
liberally used, more than 400 according to the author. In some cases,
they make the explanations rather redundant! As he himself says,
"To satisfy the diverse needs of both these categories," (IT
professionals and students) "the book is designed carefully. On the
one hand, it touches upon the aspects that the IT professionals like to
know (conceptual level), and it also goes into the depth of every
aspect, to satisfy the needs of the students." Atul uses day-to-day
examples and real life situations and relates it to his explanation of
various security concepts that is a very effective tool.
The book is divided into
10 chapters ranging from basic concepts of security, cryptography (for
the uninitiated, the author has gone at great lengths to explain the
whole concept of cryptography with examples and methods of encoding
correspondence), it’s history, types of cryptography, its relevance
vis-`E0-vis computers and the Internet, its adoption to secure
information transfer on the internet and computer networks. The book
also discusses at length, PKI models – hierarchical as well as
horizontal, certifying authorities – their role and duty. There is a
chapter dedicated to security protocols like SSL, SET, WAP, electronic
money and e-mail security. Authentication issues, Network Security and
Case Studies on Cryptography have individual chapters dedicated to them.
Since the whole basis of
cryptography revolves around algorithms, modular mathematics and other
mathematical concepts, the author has been sensitive to the need and has
explained all such propositions in detail in the appendices of the book.
It’s an essential pre-requisite for understanding this concept.
Even more unique is his
declarations in various parts of the book that in case what is about to
follow seems to be complicated or difficult the reader may move on to
the next topic without any loss of continuity. I don’t recall a single
book during my student days that carried such a reassuring and
empathising statement!
Each chapter is followed
by a chapter summary, key terms and concepts, multiple-choice questions
(with answers at the end of the book), review questions and designing
and programming exercises. The book culminates with an exhaustive
Glossary. All in all, its good value for money, both for IT professional
as well as students.
|