<< 1 >>
Rating: ![4 stars](http://www.reviewfocus.com/images/stars-4-0.gif) Summary: Great for researchers and anyone into ubiquitous computing Review: Great for researchers and everyone who is interested in ubiquitous computing, which may very well be the future of computing. The book in general gives a high-level overview of available technology and security issues/requirements needed for this technology. One drawback is that the book will probably become obsolete after sometime as ubiquitous computing is evolving relatively fast..
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Excellent book Review: This book is understandable by both the technical and lay person. It provides an overview of what UbiComp is including many real life examples. Then goes on to give examples of the security violations that could result from these technologies. Some of them obvious and others pretty insightful (especially the one about RFID tags). The book then delves into general security concepts in more detail and finishes off with some greatly named concepts: "The resurrecting duckling policy" and "the cocaine auction protocol". The appendix has a review on some math if you want to learn it or refresh your memory. The writing style is very clear and peppered with examples. This book as no ambiguous notation. That in itself is impressive for any technical volume. Amazingly, all that is contained in this very thin book.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Great Book Review: This is an excellent book and well written. It sits between being a book on UbiComp and one on security and does a great job of explaining both fields to each other. The examples chosen are from the authors own history and so he speaks with authority on them. The author is balanced in that he gives the minus points on various technologies etc as well as the plus points. After an introduction the author spends two chapters explaining UbiComp and security from a general perspective. Both are well written and require no prior knowledge. He then in the remaining chapters goes on to address the particular security concerns in the UbiComp environment. I thoroughly recommend this
<< 1 >>
|