Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Wolf, Gunnar
Instituto de Investigaciones Económicas UNAM
Coyoacán, Mexico
 
   Featured Reviewer
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Gunnar Wolf teaches operating systems at the School of Engineering and is the network and systems administrator at the Institute of Economic Research, both at the National Autonomous University of Mexico (UNAM). Having worked in computing from a young age, his self-taught passion for the field earned him the equivalency of a bachelor of science degree in 2011. He then pursued specialization and master’s degrees in information security at the National Polytechnic Institute of Mexico (IPN), and is currently pursuing doctoral studies in computer science and engineering at UNAM.

Together with computer security, Gunnar’s passion has always been free software. He has been an Emacs and LaTeX (back then, just TeX) user for 40 years, since 1983, and a Linux user and enthusiast since 1996. After joining the Mexican Linux User Group, he founded and coordinated Congreso Nacional de Software Libre (National Free Software Conference, CONSOL) from 2001 to 2005, and Encuentro en Línea de Educación y Software Libre (Online Encounter for Education and Free Software, EDUSOL) from 2005 to 2010. He has been a member of the Debian Project since 2003, which creates one of the leading GNU/Linux distributions, and has been involved in different aspects of organizing its annual conference (DebConf) since 2005.

His research focus has long been aligned with cryptographic protocols as a way to ensure both anonymity and identity verification, with a specific interest in centralization-free implementations.

Gunnar has been a reviewer for Computing Reviews since 2022.

 
 
Options:
Date Reviewed  
 
1
- 5 of 5 reviews

   
   Constructed truths: truth and knowledge in a post-truth world
Zoglauer T., Springer International Publishing, Cham, Switzerland, 2023. 162 pp.  Type: Book (3658399414), Reviews: (1 of 2)

Many of us grew up used to having some news sources we could implicitly trust, such as well-positioned newspapers and radio or TV news programs. We knew they would only hire responsible journalists rather than risk diluting public trust and losing...

Mar 6 2024  
   A deep learning technique for intrusion detection system using a recurrent neural networks based framework
Kasongo S. Computer Communications 199113-125, 2023.  Type: Article

So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron is too limited to get “int...

Jan 19 2024  
   A deep learning technique for intrusion detection system using a recurrent neural networks based framework
Kasongo S. Computer Communications 199113-125, 2023.  Type: Article

So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron is too limited to get “int...

Jan 19 2024  
   Phishing and communication channels: a guide to identifying and mitigating phishing attacks
Sonowal G., Apress, New York, NY, 2022. 240 pp.  Type: Book (978-1-484277-43-0)

It is not far-fetched to say that most (if not all) CR readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individ...

Jan 12 2023  
   Learn enough developer tools to be dangerous: command line, text editor, and Git version control essentials
Hartl M., Pearson, Hoboken, NJ, 2022. 368 pp.  Type: Book (978-0-137843-45-9)

The command-line interface (CLI) scares many newcomers to the computing field. It is, however, a most powerful way to interact with the computer, allowing the user a command composition richness that cannot be matched via graphical interfaces. As ...

Jan 10 2023  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy