This analysis is outdated. Please reanalyze.

VerifiedTrusted Partner

Fakespot Verified Deals

Question
Check out Amazon Deals provided by our trusted partner Brad's Deals!
Get Better Amazon Deals  White arrow
Overview
  • How are reviewers describing this item?
    great, good, cryptographic, applied and first.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 51 reviews as of our last analysis date on Feb 19 2020.
Details

BETA

Most positive reviewquestion

Well written, easy to understand and follow.

Least positive reviewquestion

Not enough review data to provide meaningful insight.

Most authentic reviewquestion

I just got the book, skimmed over it and compared it with the 1st edition (Practical Cryptography).First of all, if you don't h...  Read More

Least authentic reviewquestion

Not enough review data to provide meaningful insight.


Helpful Insights

BETA

    Posted by a reviewer on Amazon

    Very easy to read, very educational, should be in any it security's bookshelf.


    Posted by a reviewer on Amazon

    This book promises that it utterly will not leave the reader ready to go write good security software, but no book can do that.


    Posted by a reviewer on Amazon

    If you just want tho know the hows and whys of the application of cryptography to solve specific problems get this one.


    Posted by a reviewer on Amazon

    Then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper (but somewhat obsolete) applied cryptography: protocols, algorithms, and source code in c, second edition or to some other direction using the foundation laid down in this book and then getting other book(s) about hard-core mathematics of cryptography or about softer methods of social engineering and real-life security.


    Posted by a reviewer on Amazon

    I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things i hope to help you deciding:- first of all, obviously, the errata from the 1st edition is incorporated into the text (there is no errata for the 2nd edition yet but keep checking on the book's home page [ [.


    Posted by a reviewer on Amazon

    That can either be a pro or a con depending on what you are looking for.


    Posted by a reviewer on Amazon

    It turns out that cryptography is the least of the issues in cryptographic systems.


    Posted by a reviewer on Amazon

    But, as the authors say in their introductory chapter, cryptography by itself is fairly useless.

Review Count History
Loading...
Price History
Loading...