Printer Friendly

Practical Cryptography.

By Nick Ferguson and Bruce Schneier; published by John Wiley and Sons, 877/76)-2974 (phone), 800/597-3299 (fax), www.wiley.com (Web); 432 pages; $50.

As Mark Twain acidulously remarked, "A classic is something that everybody wants to have read and nobody wants to read." Bruce Schneier's Applied Cryptography, published in 1996, is a classic in the canon of computer security works; it's a seminal, important book for the experts in the field or for those with the technical background, but it is far too complex and mathematical for most readers.

Enter Practical Cryptography, Schneier's (and coauthor Niels Ferguson's) guide for the rest of us. It is a superb text for anyone who needs to understand the core details of cryptography but who has neither the desire nor the knowledge required to slog through a torrent of abstraction and theory.

Where Applied Cryptography is a reference, Practical Cryptography reads like a narrative. The authors plot the design of a secure cryptographic system from algorithm selection to design philosophy, to analysis, to debugging, and, finally, to implementation. The discussion of implementation is crucial, because while books on encryption theory abound, few actually discuss how to practically put the technology to use.

Though this book is much more accessible than its predecessor, it is by no means quick or easy reading. Security professionals who don't work in the trenches of IT security can safely pass this book by. But anyone looking for a practical, usable book about implementing cryptography will find a definitive resource here.

Reviewer: Ben Rothke, CPR is a New York City-based senior security consultant with ThruPoint, Inc., a network design company. He is a member of ASIS International.
COPYRIGHT 2003 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Author:Rothke, Ben
Publication:Security Management
Article Type:Book Review
Date:Sep 1, 2003
Words:280
Previous Article:Virginia.
Next Article:Practical Bomb Defense.


Related Articles
Securing Windows NT/2000 Servers for the Internet.
Cryptography Decrypted: A Pictorial Introduction to Digital Security.
Information security; principles and practice.
PGP & GPG; email for the practical paranoid.
Innovative Cryptography, 2d ed.
Thomson Delmar.
Number-theoretic algorithms in cryptography.
New trends in software methodologies, tools and techniques; proceedings.
Introduction to identity-based encryption.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters