Printer Friendly
The Free Library
22,728,043 articles and books

Practical Cryptography.



By Nick Ferguson Nick Ferguson (born November 27, 1974 in Miami, Florida) is an American football player who is a safety and currently plays for the Denver Broncos. College career
Nick Ferguson Lives in Colorado Springs, Colorado with his parents.
 and Bruce Schneier; published by John Wiley John Wiley may refer to:
  • John Wiley & Sons, publishing company
  • John C. Wiley, American ambassador
  • John D. Wiley, Chancellor of the University of Wisconsin-Madison
  • John M. Wiley (1846–1912), U.S.
 and Sons, 877/76)-2974 (phone), 800/597-3299 (fax), www.wiley.com (Web); 432 pages; $50.

As Mark Twain acidulously remarked, "A classic is something that everybody wants to have read and nobody wants to read." Bruce Schneier's Applied Cryptography, published in 1996, is a classic in the canon of computer security works; it's a seminal, important book for the experts in the field or for those with the technical background, but it is far too complex and mathematical for most readers.

Enter Practical Cryptography, Schneier's (and coauthor Niels Ferguson's) guide for the rest of us (abuse) for The Rest Of Us - (From the Macintosh slogan "The computer for the rest of us") 1. Used to describe a spiffy product whose affordability shames other comparable products, or (more often) used sarcastically to describe spiffy but very overpriced products.

2.
. It is a superb text for anyone who needs to understand the core details of cryptography but who has neither the desire nor the knowledge required to slog through a torrent of abstraction and theory.

Where Applied Cryptography is a reference, Practical Cryptography reads like a narrative. The authors plot the design of a secure cryptographic system from algorithm selection to design philosophy, to analysis, to debugging, and, finally, to implementation. The discussion of implementation is crucial, because while books on encryption theory abound, few actually discuss how to practically put the technology to use.

Though this book is much more accessible than its predecessor, it is by no means quick or easy reading. Security professionals who don't work in the trenches of IT security can safely pass this book by. But anyone looking for Looking for

In the context of general equities, this describing a buy interest in which a dealer is asked to offer stock, often involving a capital commitment. Antithesis of in touch with.
 a practical, usable book about implementing cryptography will find a definitive resource here.

Reviewer: Ben Rothke, CPR Cardiopulmonary Resuscitation (CPR) Definition

Cardiopulmonary resuscitation (CPR) is a procedure to support and maintain breathing and circulation for a person who has stopped breathing (respiratory arrest) and/or whose heart has stopped (cardiac
 is a New York New York, state, United States
New York, Middle Atlantic state of the United States. It is bordered by Vermont, Massachusetts, Connecticut, and the Atlantic Ocean (E), New Jersey and Pennsylvania (S), Lakes Erie and Ontario and the Canadian province of
 City-based senior security consultant with ThruPoint, Inc., a network design company. He is a member of ASIS International.
COPYRIGHT 2003 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Author:Rothke, Ben
Publication:Security Management
Article Type:Book Review
Date:Sep 1, 2003
Words:280
Previous Article:Virginia.
Next Article:Practical Bomb Defense.



Related Articles
Securing Windows NT/2000 Servers for the Internet.
Cryptography Decrypted: A Pictorial Introduction to Digital Security.
Information security; principles and practice.
PGP & GPG; email for the practical paranoid.
Innovative Cryptography, 2d ed.
Thomson Delmar.
Number-theoretic algorithms in cryptography.
New trends in software methodologies, tools and techniques; proceedings.
Introduction to identity-based encryption.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters