Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

List Price: $60.00
Your Price: $37.80
Product Info Reviews

<< 1 .. 3 4 5 6 7 8 9 >>

Rating: 5 stars
Summary: Excellent introductory to crypto!!!
Review: Are you scared reading those CRYPTO, EUROCRYPT, ESORICS... papers? Read St.Schneier's first. It gives you an excellent all-aspect introduction in cryptography. You should be canonized, Bruce...! God bless you...

Rating: 4 stars
Summary: A must-have book
Review: Schneier undoubtedly owns the most recognizable face in cryptography-land. This book is the reason, and it's not a bad one either.

Every computer scientist should own this book, which is well worth the price. It's a good starter, but if you're really looking for depth in cryptography, you could do not better than Stinson's "Cryptography: theory and practice" (mostly theory, actually).

Schneier's book is light on mathematics and detail, but is for the most part an enjoyable read and gives enough detail for you to code (but not to understand) your favourite cryptographic algorithm (provided it's pre-1995).

Pop out the third version, please Bruce.

Rating: 5 stars
Summary: An excellent introduction to a blooming field
Review: I had some knowledge in cryptogpraphy, but this was my first contact with a book that gives a covering of the field in one volume. I was excited. It was my vacation book and it was a good choice. It will remain on my desk or close to me.

Rating: 5 stars
Summary: types of coding technique of plaintext using c
Review: to encipher plaintext using substitute and transposition methods by using c language,

Rating: 5 stars
Summary: An outstanding tour de force
Review: This is an astounding book. It's technically very detailed but not *too* mathematical for us mere mortals. It's also enjoyable to read, which facilitates understanding of the subject.

If you're a programmer or have an interest in data security / privacy, then I strongly recommend that you buy this book.

Rating: 3 stars
Summary: if you have a LOT of time, patient etc.. this may be for you
Review: applied cryptography is in no doubt an excellent book! introducing cryptography in beginners/avarage user level in a fantastic way! and i recommend this book to anyone who have any intrest in it! BUT i most also say that the book required a lot of time and patient and time! dont think that you will read the book for a week, 3 - 4 hours a day and be able to do any cryptography!!! its very long and exhausting! also, i thought that the C Source ware VERY poor! although the book explains in an excellent way! i couldent ignored the VERY little and poor C sources! and i most dissapoint you if you think you will learn anything from those sources! because you wount! so i took 2 stars (that many!) for the poort C Source.

Rating: 5 stars
Summary: The Ultimate Resource of Cryptography (a bible?)
Review: After reading this comprehensive book on stream ciphers, block cipers, public/private ciphers, hash functions, DES, and other things. I have come to the conclusion that Schneier has written a book that should be on the shelf of every cryptographer, wanna-be cryptographer, or anybody else interested in cryptography.

Rating: 5 stars
Summary: Simply .... Excellent.
Review: This is a Excellent book, OK

Rating: 5 stars
Summary: very good
Review: it is excellen

Rating: 5 stars
Summary: The best introduction to cryptography
Review: Even if you know nothing about what cryptography is, you can still get a lot from it.


<< 1 .. 3 4 5 6 7 8 9 >>

© 2004, ReviewFocus or its affiliates