Kundenrezensionen


50 Rezensionen
5 Sterne:
 (38)
4 Sterne:
 (9)
3 Sterne:
 (2)
2 Sterne:
 (1)
1 Sterne:    (0)
 
 
 
 
 
Durchschnittliche Kundenbewertung
Sagen Sie Ihre Meinung zu diesem Artikel
Eigene Rezension erstellen
 
 

Die hilfreichste positive Rezension
Die hilfreichste kritische Rezension


3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Pflicht-Kauf in Punkto Kryptographie
Bruce Schneier ist neben der von ihm entwickelten Krypto-Algorithmen ebenso für sein relativ populistisches Fachbuch bekannt. Darin beschreibt er sehr detailliert und übergreifend die Funktionsweise der verschiedenen Protokolle und Methoden. Ein Pflicht-Kauf für all jene, die sich ernsthaft mit Kryptographie beschäftigen möchten. Laut einem...
Veröffentlicht am 4. Februar 2003 von www.scip.ch

versus
3.0 von 5 Sternen if you have a LOT of time, patient etc.. this may be for you
applied cryptography is in no doubt an excellent book! introducing cryptography in beginners/avarage user level in a fantastic way! and i recommend this book to anyone who have any intrest in it! BUT i most also say that the book required a lot of time and patient and time! dont think that you will read the book for a week, 3 - 4 hours a day and be able to do any...
Am 23. Mai 1999 veröffentlicht


‹ Zurück | 1 25 | Weiter ›
Hilfreichste Bewertungen zuerst | Neueste Bewertungen zuerst

3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Pflicht-Kauf in Punkto Kryptographie, 4. Februar 2003
Bruce Schneier ist neben der von ihm entwickelten Krypto-Algorithmen ebenso für sein relativ populistisches Fachbuch bekannt. Darin beschreibt er sehr detailliert und übergreifend die Funktionsweise der verschiedenen Protokolle und Methoden. Ein Pflicht-Kauf für all jene, die sich ernsthaft mit Kryptographie beschäftigen möchten. Laut einem Mail-Wechsel mit Schneier (Oktober 2002) wird es keine dritte Auflage dieses Werks geben, da das Thema explodiert ist und nicht mehr in einem einzelnen Band abgehandelt werden könne.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen The best introduction to cryptography I have read, 21. Januar 1999
Rezension bezieht sich auf: Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) (Taschenbuch)
If you are already a cryppie or other security professional, this book will not add much to your knowledge. But if you are a programmer or other systems person with a desire to familiarize yourself with the field, I can't recommend this book highly enough. A reasonably solid mathematical background is required to fully understand the algorithms, but the book is structured in such a way that you can skip most of the heavily technical stuff and still get a lot out of the read.
Because this is essentially an introductory text, generality is the name of the game. Pretty much everything is covered, but to a low, or medium at best, degree of depth. (Only DES is covered thoroughly.) However, the reference list in the back is huge, and you can use it to easily track down any more detailed information that you're after.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Essential Crypto Overview, 2. Juli 2000
Von 
Robert Green (New York, NY USA) - Alle meine Rezensionen ansehen
(REAL NAME)   
Rezension bezieht sich auf: Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) (Taschenbuch)
Clearly a monumental work. Easy reading style, thorough treatment of protocols and ciphers of all styles and purposes...if you read this and don't pick up something useful then I want to hire you!
Copious and meticulous references. Consistent style throughout is a big plus. Dry wit (Alice and Bob find a book on Artificial Inteligence lying discarded and unused on the road...)makes for fun reading.
The only thing I would wish for is a clearer delineation between protocols and ciphers in the public domain vs. patented.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


5.0 von 5 Sternen The most comprehensive text on computer-era cryptology., 13. Dezember 1996
Von Ein Kunde
Rezension bezieht sich auf: Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) (Taschenbuch)
Habitues of sci.crypt will be familiar with Bruce Schneier's
*Applied Cryptography*; if any of them have but one text on crypto
for reference, it will almost certainly be *Applied Cryptography*.
It is the de facto standard reference on modern cryptography as
well as serving as an excellent introduction to the subject.

The art is very old - Julius Caesar was the first recorded user of
cryptography for military purposes - and reached a watershed when
computers were put to work in order to break German and Japanese
ciphers. Indeed, that was the first *real* application of electronic
computers. A natural development was the use of computers for the
development of cryptographic systems.

That is where Bruce Schneier's remarkable book begins. It is notable
for two reasons: the breadth and depth of coverage, and the high
standard of technical communication.

As a reference its scope is encyclopaedic, providing descriptions
and assessments of just about every non-military crypto system
developed since computers were first applied to the purpose. There
are also military-cum-government algorithms amongst the collection,
some from the old Soviet Union and others from South Africa. It is
not just an A-Z procession of algorithms; the author progresses
in a logical manner through the many technical aspects of cryptography.

It is common to find that masters of mysterious technical arts are
poor communicators. Bruce Schneier demonstrates exceptional skill
as a technical communicator. Here is a book about an esoteric
subject - one built on a foundation of theoretical mathematics - that
ordinary folk can read. Sure, one needs to be motivated by an interest
in the subject, and the technical level sometimes requires a more than
ordinary background in number theory and the like - but a degree in
theoretical mathematics is not necessary to derive pleasure and profit
from reading *Applied Cryptography*.

A thirty-page chapter provides a brief, but lucid account of the
necessary mathematical background, spanning information theory,
complexity theory, number theory, factoring, prime number generation,
and modular arithmetic. Even if one needs no other information than
a useful description of modular arithmetic the book is worth looking
at; I can't think of any better source outside full-blown mathematical
texts, and the author does it without being obscure.

The book is divided into parts, beginning with protocols (the
introductory chapter is an excellent overview of crypto as it
is presently applied) from the basic kind through to the esoteric
that find application in digital cash transactions. Public key
encryption, the second - and most significant - watershed in cryptography, is introduced with an explanation of how it is used
in hybrid systems.

Part II deals with cryptographic techniques and discusses the
important issues of key length, key management, and algorithm
types. The strength of a crypto system relies very heavily on the
length of the key, the way in which it is generated, and key
management. A chapter is devoted to the practical aspects of using
algorithms (which one, public-key as against symmetric crypto,
hardware versus software) for various purposes (such as
communications and data storage).

Part III is about particular algorithms, providing for each one
a background of its development, a description, its security, and
how it is likely to stand up to attack. The algorithms are divided
into classes: block (some twenty-one are described);
pseudo-random-sequence generators and stream ciphers (PKZIP is a
stream cipher); real random-sequence generators; one-way hash
functions; public-key; public-key digital signature; identification
schemes; key-exchange algorithms; and other special algorithms.
Many specific algorithms are described with information about
covering patents.

Part IV is entitled, The Real World; in the words of the author,
"It's one thing to design protocols and algorithms, but another
thing to field them in operational systems. In theory, theory
and practice are the same; in practice they are different".
A chapter discusses a number of implementations, including IBM
Secret-Key Management Protocol, Mitrenet (an early public-key
system), ISDN Packet Data Security Overlay, STU-III, Kerberos,
KryptoKnight, Sesame, PEM, PGP, MSP, smart cards, universal
electronic payment system, and Clipper.

Another chapter discusses politics and puts the problems of US
export restrictions into context and deals with patents. It also
has information about bodies with an interest in public access to
cryptography and standards, and legal issues.

An afterword by Matt Blaze should be required reading by everyone
who thinks a good cryptosystem is all that one needs for security;
the human factor can undo the strongest system.

A final part contains C source code for DES, LOKI91, IDEA, GOST,
Blowfish, 3-Way, RC5, A5, and SEAL. North American readers can
obtain a 3-disk set containing code for some forty-one algorithms,
four complete systems, source code for some other utilities,
text files, errata, and notes on new protocols and algorithms.

Who, apart from crypto professionals and aficionados, is likely
to find *Applied Cryptography* of interest? Anyone with an
intelligent interest in the art, and who wants something more
substantial than a quasi adventure account of modern crypto;
anyone with a responsibility for protecting data and/or
communications; network administrators; builders of firewalls;
students and teachers of computer science; programmers; and
anyone with a serious interest in theoretical mathematics - I'm
sure the list could be expanded considerably.

Apart from a book to be read, it is the most complete and up-to-date
resource and reference presently available. The list of references
(1653 of them) is a resource in its own right. An essential
acquisition for libraries.

The book, of necessity, contains highly technical material, but it
can be read. The publishers, Wiley's, are to be congratulated.

Reviewed by Major Keary majkeary@netspace.net.au

DISCLAIMER: The opinions expressed are my own. I have no interest,
financial or otherwise, in the success or failure of this book,
and - apart from a review copy - I have received no compensation
from anyone who has.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


5.0 von 5 Sternen One third theory, one third practice, one third politics, 16. Oktober 1998
Rezension bezieht sich auf: Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) (Taschenbuch)
An excellent, informative and entertaining introduction to this field.
The first third covers, in reasonably technical detail, the theory and mathematical implementation of cryptosystems. Much of this isn't necessary for the casual reader, but its the clearest explanation of this arcane stuff you're going to find anywhere.
The second third covers real-world applications of cryptosystems - electronic voting, cyber-money, key management and a thousand other inventive uses. Sufficiently non-technical for even a salesman to understand.
The last third covers the politics of modern encryption, and is more intriguing, exciting and informative than any Tom Clancy novel. This last part alone is worth the price of the book.
Schneier's writing style is informal, informative and often humourous. It's hard to believe anyone can write about such a (potentially) dry subject and yet include some genuine jokes!
Buy this book.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


5.0 von 5 Sternen Invaluable resource for almost everyone., 4. September 1998
Von Ein Kunde
Rezension bezieht sich auf: Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) (Taschenbuch)
The red cover of the book drew my attention while I was browsing the shelves of the library here. I borrowed the book and was immediately fascinated by the style of the book. Clear outlines, huge reference appendix for readers who want to delve further into particular subjects, not too much plain text on one page. It gives a perfect overview of the things a cryptographer, or just an interested amateur, needs to know about particular subjects.
There might be one little disadvantage (it wasn't for me though), and that's the rather superficial coverage of some of the concepts, especially the mathematical background (number theory, complexity theory) of cryptography. But the book is not intended to be a math book. If you want to study the mathematics of cryptography, read Konheim or Niederreiter. If you want to study the concepts that underly the many fields of cryptography, read Schneier.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


5.0 von 5 Sternen An *EXCELLENT* reference book on cryptography!, 10. August 1997
If you have *ANY* interest whatsoever in cryptography (public keys, private keys, RSA, government policies (sic), etc), then this is *THE* book for you. Bruce does a very good job of explaining a very difficult subject. The book covers *EVERYTHING*, from A-Z on the subject,so if you want to understand how public keys work, you can read up on that, similarly, if you want to understand how linear feedback shift registers work, there is a section on that also.

Bruce does *NOT* have a very high opinion of our exalted leaders in Washington, which shows in the book, and the style is very conversational, with a number of humorous lines and comments thrown in. This kept me wide awake through all 700 pages.

The bibliography is extensive, and even includes some good books on WWII cryptography and the Enigma machine used by the Germans.

If you only buy 1 book on cryptography, buy this one!
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


4.0 von 5 Sternen A practical cryptography reference for programmers., 14. Mai 1997
Von Ein Kunde
Rezension bezieht sich auf: Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) (Taschenbuch)
This is a good solid review of most current cryptography with source code available for software programmers. It does not go into mathematical proofs. I read the first version from cover to cover, however this edition, the second, is too large. It has become more of a reference book, although still very readable in parts. My only disappointment is the lack of good coverage of extremely high-speed cryptography like SEAL or MISTY or in depth explanations of secure computer network protocols like Novell's NetWare 4 RSA/GQ key exchange or Microsoft's NT hash-oriented key exchange. Also a more complete coverage of smart card technology would be nice. Basically this will get a competent engineer up to speed with 5 year old cryptography. This is still better than most alternatives like mathematics books or high-level overview books that are vague on details
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


5.0 von 5 Sternen Deserves all five stars!, 24. August 1998
Von 
R. Hornbaker (Chandler, AZ USA) - Alle meine Rezensionen ansehen
(REAL NAME)   
As a layman to crypto, I found this book fascinating. It offers great insight to the technologies, and specifically analyzes several algorithms.
This is widely considered the de facto text on the subject. I can see why - the text is comprehensive, and the format is very readable. It takes the reader from layman to technical - you can read this at any level and still get great value from it.
Using this book, I've been able to solidify my understanding of the different technologies. Schneier's analysis of numerous algorithms has proven invaluable - both in selecting an algorithm, as well as assessing the security of commercial systems.
I've had my copy for a couple of years, and it's been a constant reference. Well worth the money.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


5.0 von 5 Sternen Schneier is to crypto like Fowler is to English, 1. August 1997
Von Ein Kunde
The mathematics, not to say sheer logic,
is likely to scare a lot of people.
I find when I lend the book that most people go
through quickly and read what might be
called the cryptographic purple patches --
pure prose sections, summing up which
ciphers are weak and which aren't, some of
the history, and such things. The rest they
leave. I've found myself in the position of
trying to explain all this stuff to CEOs and
other execs. It is hard. I wrote a CEO-friendly
summary ([...]) and it
worked fairly well. The people who need to
know this are also the hardest to get into the
topic. Maybe Bruce Schneier would like to
try writing a non-mathematical summary for
the intelligent layman -- like Einstein did
in The Evolution of Physics.
Helfen Sie anderen Kunden bei der Suche nach den hilfreichsten Rezensionen 
War diese Rezension für Sie hilfreich? Ja Nein


‹ Zurück | 1 25 | Weiter ›
Hilfreichste Bewertungen zuerst | Neueste Bewertungen zuerst

Dieses Produkt

Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science)
EUR 56,40
Auf Lager.
In den Einkaufswagen Auf meinen Wunschzettel
Nur in den Rezensionen zu diesem Produkt suchen