Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl-Sensitive Sunglasses

Bruce Schneier (I little OT)

by Rhose (Priest)
on Sep 20, 2001 at 19:57 UTC ( #113617=note: print w/replies, xml ) Need Help??

in reply to Re: What's the idea of different salts in crypt()?
in thread What's the idea of different salts in crypt()?

Add it right next to Applied Cryptography: Protocols, Algorithms, and Source Code in C or between it and Secrets and Lies : Digital Security in a Networked World? *Smiles*

Speaking of which, if you read "Secrets and Lies", what were your impressions? (I am only about half way through it myself.)

Replies are listed 'Best First'.
Re: Bruce Schneier (I little OT)
by cacharbe (Curate) on Sep 20, 2001 at 21:23 UTC
    Although a little pedantic at times, I feel that it should be the Number One Read (tm) for any and all CIOs and CSOs. I see people everyday who are quelled into thinking that security can be had with a product, and they are duped into leaving the humans, and the process alone.

    Security is a process, not a product, and I think Bruce hits the nail on the head (a bunch of times). I didn't mention Secrets and Lies in my post because it deals with the whole process, and I wanted text book product investigation.

    Yes, read "Secrets and Lies". Even if you aren't interested in how encryption works on a mathematical level, how to properly implement the process should be foremost on everyone's minds.


Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://113617]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others lurking in the Monastery: (5)
As of 2016-10-23 12:59 GMT
Find Nodes?
    Voting Booth?
    How many different varieties (color, size, etc) of socks do you have in your sock drawer?

    Results (301 votes). Check out past polls.