1.575,00 EGP
From the brand
Packt is a leading publisher of technical learning content with the ability to publish books on emerging tech faster than any other.
Our mission is to increase the shared value of deep tech knowledge by helping tech pros put software to work.
We help the most interesting minds and ground-breaking creators on the planet distill and share the working knowledge of their peers.
See Our Full Range
Cybersecurity and Pentesting
Linux and Networking
See Our Full Range
Publisher : Packt Publishing (August 12, 2024)
Language : English
Paperback : 410 pages
ISBN-10 : 1835080030
ISBN-13 : 978-1835080030
Item Weight : 1.56 pounds
Dimensions : 0.73 x 7.5 x 9.25 inches
Description
Price: $15.75
(as of Feb 14,2025 04:32:05 UTC – Details)
From the brand
Packt is a leading publisher of technical learning content with the ability to publish books on emerging tech faster than any other.
Our mission is to increase the shared value of deep tech knowledge by helping tech pros put software to work.
We help the most interesting minds and ground-breaking creators on the planet distill and share the working knowledge of their peers.
See Our Full Range
Cybersecurity and Pentesting
Linux and Networking
See Our Full Range
Publisher : Packt Publishing (August 12, 2024)
Language : English
Paperback : 410 pages
ISBN-10 : 1835080030
ISBN-13 : 978-1835080030
Item Weight : 1.56 pounds
Dimensions : 0.73 x 7.5 x 9.25 inches
Great book, just in time.
Well written book compared to others on the same topic. Started reading the book and found the content to be useful.
Excellent resource for cryptography enthusiasts
Although the book is aimed at beginner-level IT professionals, students, and cybersecurity enthusiasts, I found certain parts of it hard going, especially since it has been a few decades since I last studied university-level mathematics. However, any decent book on Crypto Algorithms without covering mathematics will leave its readers short-changed. Hence, the inclusion of this in the book is a positive thing.Sections 1 and 2 will introduce you to some of the historical aspects of cryptography and the classical symmetric and asymmetric encryption protocols and standards. It is an excellent way to lay down the foundations.Section 3 covers the newer algorithms and protocols. I found the Zero-Knowledge Protocols (ZKP) chapter of particular interest and relevance since it concerns authentication and identity. I enjoyed the author’s scenario-based explanation of ZKP (labelled as “. . . the digital cave”), which is a great way to explain a complex topic.Chapter 6, which covers Lightweight encryption (amongst other topics), will be particularly appealing to those with a keen interest in IoT security. The inclusion of a Lightweight encryption Algorithms (LEA/LE) was a highlight for me, and I’m sure it will be for you too.In section 4, we transition over the emerging trends and threats of Quantum Cryptographyâan essential topic for any cybersecurity professional. Buckle up for the chapter; you are in for a treat (well, if you are a nerd like me! ð¤ ) – I was fully expecting to read about quantum algorithms, but seeing Q-Mechanics included as well was like a kid in a candy shop.With all that said, is the book worth buying? In my opinion, the wealth of knowledge and insights it offers make it a resounding YES!
Not worth buying
This is a low-quality book, in my opinion. Poorly translated, sloppily written, and full of errors and typos â hard to excuse for a second edition!
An excellent resource for a practical understanding of modern cryptographic algorithms
“Cryptography Algorithms 2E” by Massimo Bertaccini and published through Packt Press is an excellent resource for those looking to gain a practical understanding of modern cryptographic algorithms. This book offers a clear, concise, and hands-on approach to learning about encryption, hashing, and digital signatures. The author does an impressive job of breaking down complex concepts into digestible chunks, making it accessible for readers with varying levels of cryptography knowledge.The book’s strength lies in its focus on implementation, providing code examples and practical exercises that reinforce the theoretical concepts. This approach is particularly valuable for developers and security professionals who want to apply cryptographic principles in their work. The second edition updates the content to reflect current best practices and emerging trends in the field, ensuring that readers are equipped with up-to-date knowledge.While “Cryptography Algorithms 2E” is an excellent resource, it’s important to note that it serves a different purpose than Bruce Schneier’s seminal work, “Applied Cryptography.” Schneier’s book is a comprehensive tome that delves deep into the mathematical foundations and historical context of cryptography. It’s considered a definitive text in the field, offering a broader and more theoretical perspective.In contrast, “Cryptography Algorithms 2E” is more focused on practical implementation and contemporary algorithms. It’s designed to get readers up and running with cryptographic techniques quickly, making it an ideal choice for those who want to apply cryptography in their projects without necessarily diving into the mathematical intricacies.For those seeking a practical, hands-on guide to modern cryptographic algorithms, “Cryptography Algorithms 2E” is an outstanding choice. However, readers looking for a comprehensive, in-depth exploration of cryptography’s theoretical foundations might find Schneier’s “Applied Cryptography” more suitable. Ideally, serious students or practitioners of cryptography would benefit from reading both, as they complement each other well.
Cut Through the Cryptography Fog.
This book not only builds a crypto foundation but it teachers about real world instances where crypto has been used on servel levels. Providing practical examples and instances where cryptography has been used to solve and provide encryption algorithm as a security solution. I enjoyed the fact that we stepped through the different types of encryption and the way they can be used in the modern world. This book brings you out of the dark on the art of encryption and shines a brilliant light through the fog and misconception about cryptography.This book is an excellent read and it’s one to put in your cyber library.
Quantum Cryptography & Homomorphic Encryption â if you know you know!
I was honored to receive an early review copy of Professor Bertacciniâs book and I have thoroughly enjoyed reading through it!He goes into contextual knowledge detailing meticulously the basics of quantum, and at the same time elevates information for practical real-world scenarios that will help solve for encryption algorithm migrations as part of post quantum security.He shines a brilliant light at the absolute genius of homomorphic encryption, while also pulling readers to think through real world applications and security implications.Personally, it was a great read! Needless to say, I highly recommend you grab a copy, asap.
Explain in comprehensible way results of a profound study
I was seeking a Book to explore cryptography and the algorithms of this fascinating science in a comprehensible way. This Book is exactly what I want. In particular, I appreciated the excellent fluidity and clarity of the Author’s exposition. Moreover, I find that the new graphic of the Book helps a lot to focus on the important topics. I certainly recommend this Book to anyone who wants to discover cryptography from scratch.