Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
PGP : Pretty Good Privacy

PGP : Pretty Good Privacy

List Price: $34.95
Your Price: $34.95
Product Info Reviews

<< 1 2 >>

Rating: 3 stars
Summary: A Pretty Good history of PGP
Review: The first half of "PGP: Pretty Good Privacy" is devoted to cryptography basics and the history behind PGP. It's certainly interesting reading, especially seeing how the relationships among the players developed. If you're interested in this background, then this book is for you.

The second half explains PGP usage and where you can find it online. Unfortunately, a lot of this seems dated -- however, to be fair, the book is over five years old. You'll probably be better off with another resource such as the included documentation.

Rating: 3 stars
Summary: A Pretty Good history of PGP
Review: The first half of "PGP: Pretty Good Privacy" is devoted to cryptography basics and the history behind PGP. It's certainly interesting reading, especially seeing how the relationships among the players developed. If you're interested in this background, then this book is for you.

The second half explains PGP usage and where you can find it online. Unfortunately, a lot of this seems dated -- however, to be fair, the book is over five years old. You'll probably be better off with another resource such as the included documentation.

Rating: 3 stars
Summary: A Pretty Good history of PGP
Review: The first half of "PGP: Pretty Good Privacy" is devoted to cryptography basics and the history behind PGP. It's certainly interesting reading, especially seeing how the relationships among the players developed. If you're interested in this background, then this book is for you.

The second half explains PGP usage and where you can find it online. Unfortunately, a lot of this seems dated -- however, to be fair, the book is over five years old. You'll probably be better off with another resource such as the included documentation.

Rating: 4 stars
Summary: Dated but useful nonetheless
Review: This book gives an excellent account of how encryption came into the hands of non-spooks (and I don't mean Clipper). But what really matters is the legacy information on how encryption works. This information hasn't changed since. It also gives the reader a solid base of understanding of what PGP is doing when you use it.

The book is also quite simple to read, so much so that I felt guilty for "studying" a book that was so easy that I could blow through a chapter in twenty minutes. One final note of importance is that because the book is old (94), it is UNIX-centric, which is quite refreshing in today's environment of applications written exclusively for Windoze.

Rating: 4 stars
Summary: Dated but useful nonetheless
Review: This book gives an excellent account of how encryption came into the hands of non-spooks (and I don't mean Clipper). But what really matters is the legacy information on how encryption works. This information hasn't changed since. It also gives the reader a solid base of understanding of what PGP is doing when you use it.

The book is also quite simple to read, so much so that I felt guilty for "studying" a book that was so easy that I could blow through a chapter in twenty minutes. One final note of importance is that because the book is old (94), it is UNIX-centric, which is quite refreshing in today's environment of applications written exclusively for Windoze.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates