NEW! Fakespot Chat is live. 

Get answers to your product questions here.

This analysis is outdated. Please reanalyze.

Ask Fakespot Chat questions about this productAlpha

Initializing Fakespot Chat

error

System error,

Loading suggested questions

Suggested Questions

athena-arrow

Suggested Questions

No suggested questions were found

Please note: The content is generated by an AI language model based on reviews. We are constantly improving the accuracy, however, its outputs may contain errors or offensive content from certain reviews. Please report any errors or offensive content to us. Also, please note that we will not collect your questions unless you click the thumbs up/down button to provide feedback. The answers displayed will be stored by us so if another Fakespotter asks a similar question we can provide them an answer faster. Your feedback will only help us make Fakespot Chat better! By using Fakespot Chat, you agree to Fakespot's terms of use and privacy notice.

Overview

  • How are reviewers describing this item?
    great, good, cryptographic, applied and first.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 51 reviews as of our last analysis date on Feb 19 2020.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    Very easy to read very educational should be in any it securitys bookshelf


    Posted by a reviewer on Amazon

    This book promises that it utterly will not leave the reader ready to go write good security software but no book can do that


    Posted by a reviewer on Amazon

    If you just want tho know the hows and whys of the application of cryptography to solve specific problems get this one


    Posted by a reviewer on Amazon

    Then depending on your interests and needs you could proceed to a technically and mathematically much deeper but somewhat obsolete applied cryptography protocols algorithms and source code in c second edition or to some other direction using the foundation laid down in this book and then getting other books about hardcore mathematics of cryptography or about softer methods of social engineering and reallife security


    Posted by a reviewer on Amazon

    I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things i hope to help you deciding first of all obviously the errata from the 1st edition is incorporated into the text there is no errata for the 2nd edition yet but keep checking on the books home page


    Posted by a reviewer on Amazon

    That can either be a pro or a con depending on what you are looking for


    Posted by a reviewer on Amazon

    It turns out that cryptography is the least of the issues in cryptographic systems


    Posted by a reviewer on Amazon

    But as the authors say in their introductory chapter cryptography by itself is fairly useless

Review Count History
Loading...
Price History
Loading...

Ask Fakespot Chat questions about this productAlpha

Initializing Fakespot Chat

error

System error,

Loading suggested questions

Suggested Questions

athena-arrow

Suggested Questions

No suggested questions were found

Please note: The content is generated by an AI language model based on reviews. We are constantly improving the accuracy, however, its outputs may contain errors or offensive content from certain reviews. Please report any errors or offensive content to us. Also, please note that we will not collect your questions unless you click the thumbs up/down button to provide feedback. The answers displayed will be stored by us so if another Fakespotter asks a similar question we can provide them an answer faster. Your feedback will only help us make Fakespot Chat better! By using Fakespot Chat, you agree to Fakespot's terms of use and privacy notice.