Hardcover: 784 pages
Publisher: Wiley; 1 edition (March 30, 2015)
Product Dimensions: 7.8 x 1.6 x 9.6 inches
Shipping Weight: 3.2 pounds (View shipping rates and policies)
Average Customer Review: 4.6 out of 5 stars See all reviews (8 customer reviews)
Best Sellers Rank: #410,904 in Books (See Top 100 in Books) #109 in Books > Computers & Technology > Security & Encryption > Encryption #116 in Books > Computers & Technology > Security & Encryption > Cryptography #5383 in Books > Textbooks > Computer Science
Be forewarned, this "updated" edition is not updated. I mistakenly assumed the author would have added coverage of AES, which became the standard after DES was defeated, given the recent (2015) issue date. WRONG. This is just an expensive repackaging of the same old 1996 volume I already had in paperback. If you have the older version already, learn from my mistake. You don't need this. If, however, you don't have a copy and you work with cryptography, or need a good reference on older tech, you might want it. It is NOT "current" as the description claims, however; not by any measure. Wanna buy a used paperback version? :-)
If you are interested in, working in, purchasing certifications, or doing anything real in cyber security you must read this book. One of the cornerstones of information security is knowing how cryptography works and how it is applied. Bruce Schneier writes all of his books with the reader in mind. He is technical when he needs to be and practical the rest of the time. Yes, this information isn't required for any certification and you won't get any kudos for having this information on your resume, yet this is intended for those of us who are professionals in our jobs.If you have never read any of Mr. Schneier's work, start with any of his other outstanding books first. This publication is not meant for the causal reader. This book is in-depth, detailed, and built for those who are serious about their profession. Bruce takes extremely complex subjects and breaks them down into digestible chunks for those non-mathematicians such as myself. I missed those physics and quantum mechanics classes in college but Mr. Schneier eases the reader into the wild world of modern day cryptography (with a splash of history).It isn't a book that you can read just once. This document needs to sit near your desk for ready access. If you work with AES, PKI, SSL, or any other cyber security field that has lots of initials in it, you should consider whether or not you want to continue pretending to know everything or are you ready to start your real education.If you buy this book, you better have a highlighter and a pen to take notes. You will enjoy this materiel, unless you don't understand it. If you don't have dog-eared pages, just buy some "Knuckelheads Guide to Security" and call it a day. This book should make you squirm in your seat. It doesn't have a happy ending but neither does our profession.Buy it, read it, read it again, and use what you have read. Trust me.
I've used this book as a resource for teaching and for my own personal learning. Bruce Schneier is an incredible leader in the field, and he is know for his explanations that makes difficult concepts easy to grasp.That said, this book is a bit out of date if you are interested in studying any of the currently used technologies. Also, there is some errata that can confuse people not familiar with the topics already. Finally, some topics contain incomplete discussions.I would love to see an updated version of this book!
I bought this book because, with all the discussion in the news about Apple and IBM and the security of the iphone, I thought it was time I took a deep dive into understanding how this "stuff" actually works. This book has been quite eye-opening.
Applied Cryptography: Protocols, Algorithms, and Source Code in C [ APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C BY Schneier, Bruce ( Author ) Nov-01-1995 Applied Cryptography: Protocols, Algorithms and Source Code in C Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series) Swift: Programming, Master's Handbook: A TRUE Beginner's Guide! Problem Solving, Code, Data Science, Data Structures & Algorithms (Code like a PRO in ... mining, software, software engineering,) Java Programming: Master's Handbook: A TRUE Beginner's Guide! Problem Solving, Code, Data Science, Data Structures & Algorithms (Code like a PRO in 24 ... design, tech, perl, ajax, swift, python) Ruby: Programming, Master's Handbook: A TRUE Beginner's Guide! Problem Solving, Code, Data Science, Data Structures & Algorithms (Code like a PRO in 24 ... design, tech, perl, ajax, swift, python) Telephone Triage Protocols for Nursing (Briggs, Telephone Triage Protocols for Nurses098227) Telephone Triage Protocols for Nurses (Briggs, Telephone Triage Protocols for Nurses098227) Telephone Triage Protocols for Nurses (Briggs, Telephone Triage Protocols for Nurses) Coding Theory and Cryptography: The Essentials, Second Edition (Chapman & Hall/CRC Pure and Applied Mathematics) Significant Changes to the International Plumbing Code, International Mechanical Code and International Fuel Gas Code, 2012 Edition Pro OpenSolaris: A New Open Source OS for Linux Developers and Administrators (Expert's Voice in Open Source) Strunk's Source Readings in Music History: The Early Christian Period and the Latin Middle Ages (Revised Edition) (Vol. 2) (Source Readings Vol. 2) Handbook of Applied Dog Behavior and Training, Vol. 3: Procedures and Protocols Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security) Combinatorial Optimization: Theory and Algorithms (Algorithms and Combinatorics) Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics) Algorithms in C, Parts 1-5 (Bundle): Fundamentals, Data Structures, Sorting, Searching, and Graph Algorithms (3rd Edition) Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms