File Size: 3584 KB
Print Length: 322 pages
Page Numbers Source ISBN: 0071794255
Publisher: McGraw-Hill Education; 1 edition (August 22, 2013)
Publication Date: August 22, 2013
Sold by: Digital Services LLC
Language: English
ASIN: B00D86FXNM
Text-to-Speech: Enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Enabled
Best Sellers Rank: #774,244 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #273 in Books > Computers & Technology > Security & Encryption > Encryption #281 in Books > Computers & Technology > Security & Encryption > Cryptography #13578 in Kindle Store > Kindle eBooks > Computers & Technology
I believe it is important to add a quick disclosure that I am not in the IT field and my review is based on my personal interest on Cryptography.The title caught my attention, but I was hesitant and intimidated to purchase the book because I thought the content would be too complex for me to comprehend. After reading the description and several sample pages from the Kindle version, I went ahead and purchased the book. Needless to say, I believe the book is tailored for those who find the topic of Cryptography of interest and those new in the field of IT and security.At every turn, terminologies were explicitly defined. The author continues to reiterate the importance of these terms through the use of the highlighted Lingo box. I appreciate how a complex subject matter was streamlined into simplistic form that non-IT readers, such as myself can grasp and appreciate. Throughout the book, the author included In My Humble Opinion, an incorporation of his personal and professional views regarding the section discussed. In addition, the inclusion of brief side notes (In Actual Practice), assist the readers to relate the content covered to major historical events and its current application to modern technology. The author’s choice to include such stories facilitates the reader to appreciate the clear connection between theory and practice.There were a few errors in the book (as mentioned by a previous reviewer), along with the author’s choice of reusing several exact materials from the first chapter into the second. I found this a little confusing. If selected materials were essential, the author could restate them again in a different way.
Cryptography InfoSec Pro Guide (Beginner's Guide) Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series) Applied Cryptography: Protocols, Algorithms, and Source Code in C [ APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C BY Schneier, Bruce ( Author ) Nov-01-1995 Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Go Pro Camera: Video editing for Beginners: How to Edit Video in Final Cut Pro and Adobe Premiere Pro Step by Step Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan Microsoft Surface Pro 4 & Microsoft Surface Book: The Beginner's Guide to Microsoft Edge, Cortana & Mail App on Microsoft Surface Pro 4 & Microsoft Surface Book iPad Pro Guide: The Ultimate Guide for iPad Pro, iPad & iPad mini The Complete Beginners Guide to Mac OS X El Capitan: (For MacBook, MacBook Air, MacBook Pro, iMac, Mac Pro, and Mac Mini) Understanding Cryptography: A Textbook for Students and Practitioners Cryptography and Coding: 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings (Lecture Notes in Computer Science) Cryptography and Network Security: Principles and Practice (7th Edition) Introduction to Cryptography with Coding Theory (2nd Edition) Cryptography Engineering: Design Principles and Practical Applications Circuit Engineering & Cryptography & Hacking Cryptography and Network Security: Principles and Practice Cryptography and Network Security: Principles and Practice (6th Edition) Coding Theory and Cryptography: The Essentials, Second Edition (Chapman & Hall/CRC Pure and Applied Mathematics) Applied Cryptography: Protocols, Algorithms and Source Code in C