Fakespot Header Logo

Fakespot Review Analyzer Report

Cryptography Engineering Design Principles and Practical Applications

Cryptography Engineering Design Principles and Practical Applications

In category Books

Fakespot Grade

A

Total Reviews

30


Fakespot Review Grade

A
Our analysis detected over 90% high quality reviews

Analyzed on:May 7, 2016
This analysis is quite old, would you like to reanalyze?
Tw seal

You can trust the reviews of this product.


Analysis overview

Our engine has discovered that over 90% high quality reviews are present.
This product had a total of 30 reviews on May 7 2016.
Interesting tidbit: the most used word by reviewers is edition.
How are reviewers describing this item?
same, first, textbook, removed and significant.

Reviews summary

Then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper (but somewhat obsolete) applied cryptography: protocols, algorithms, and source code in c, second edition or to some other direction using the foundation laid down in this book and then getting other book(s) about hard-core mathematics of cryptography or about softer methods of social engineering and real-life security

I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things i hope to help you deciding:- first of all, obviously, the errata from the 1st edition is incorporated into the text (there is no errata for the 2nd edition yet but keep checking on the book's home page [ [

] ]) which also contains the links from the book so you don't have to type them yourself while investigating- the algorithms, protocols and formulas look the same but they might have minor tweaks, most of the stuff i looked up is the same as in the 1st edition- the 2nd edition has 60 pages less and that's because the line spacing is smaller (the text is more dense) and not because some material has been omitted (at least i could not find anything significant being removed)- one (really small) speculative mathematical subchapter has been removed (4

6 in 1st edition: equation solving attacks); then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper (but somewhat obsolete) applied cryptography: protocols, algorithms, and source code in c, second edition or to some other direction using the foundation laid down in this book and then getting other book(s) about hard-core mathematics of cryptography or about softer methods of social engineering and real-life security



Review Count

Loading...




[["edition", 20], ["book", 18], ["st", 16], ["cryptography", 8], ["subchapter", 6], ["same", 6], ["text", 6], ["from", 6], ["about", 6], ["first", 6], ["like", 4], ["preface", 4], ["chapter", 4], ["textbook", 4], ["removed", 4], ["significant", 4], ["anything", 4], ["find", 4], ["looked", 4], ["most", 4], ["minor", 4], ["might", 4], ["contains", 4], ["nd", 4], ["errata", 4], ["quick", 4], ["engineering", 4], ["other", 4], ["algorithms", 4], ["protocols", 4], ["practical", 4], ["review", 2], ["update", 2], ["back", 2], ["come", 2], ["impressions", 2], ["biased", 2], ["incomplete", 2], ["likely", 2], ["bookthese", 2], ["hacking", 2], ["feels", 2], ["inside", 2], ["denser", 2], ["looks", 2], ["boring", 2], ["cover", 2], ["vs", 2], ["references", 2], ["chapter-", 2], ["another", 2], ["later", 2], ["presented", 2], ["philosophy", 2], ["design", 2], ["our", 2], ["since", 2], ["exactly", 2], ["layout", 2], ["self-study-", 2], ["suited", 2], ["mentioned", 2], ["based", 2], ["week", 2], ["proposals", 2]]

Fakespot Review Grade

A
Our analysis detected over 90% high quality reviews



Ring alt

Copyright 2018 Fakespot

Back to Top