Programming Books C Java PHP Python Learn more Browse Programming Books
  • List Price: $54.99
  • Save: $41.30 (75%)
Rented from Amazon Warehouse Deals
To Rent, select Shipping State from options above
Due Date: Dec 21, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Qty:1
  • List Price: $54.99
  • Save: $15.74 (29%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Cryptography Decrypted has been added to your Cart
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Cryptography Decrypted Paperback – December 31, 2000

ISBN-13: 078-5342616477 ISBN-10: 0201616475 Edition: 1st

Buy New
Price: $39.25
Rent
Price: $13.69
28 New from $39.23 46 Used from $7.76
Amazon Price New from Used from
Paperback
"Please retry"
$39.25
$39.23 $7.76
Amazon%20Web%20Services

$39.25 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Cryptography Decrypted + The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography + Cryptanalysis: A Study of Ciphers and Their Solution
Price for all three: $57.10

Some of these items ship sooner than the others.

Buy the selected items together

Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 384 pages
  • Publisher: Addison-Wesley Professional; 1 edition (December 31, 2000)
  • Language: English
  • ISBN-10: 0201616475
  • ISBN-13: 978-0201616477
  • Product Dimensions: 0.7 x 7.3 x 9.1 inches
  • Shipping Weight: 1.3 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (41 customer reviews)
  • Amazon Best Sellers Rank: #658,670 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Fundamental security concepts like cryptography and digital signatures are becoming as much a part of our everyday lives as megabytes and the Internet. Anyone working with computer security--security professionals, network administrators, IT managers, CEOs, and CIOs--need to have a comfortable understanding of the cryptographic concepts in this book.

Cryptography Decrypted shows you how to safeguard digital possessions. It is a clear, comprehensible, and practical guide to the essentials of computer cryptography, from Caesar's Cipher through modern-day public key. Cryptographic capabilities like detecting imposters and stopping eavesdropping are thoroughly illustrated with easy-to-understand analogies, visuals, and historical sidebars.

You need little or no background in cryptography to read Cryptography Decrypted. Nor does it require technical or mathematical expertise. But for those with some understanding of the subject, this book is comprehensive enough to solidify knowledge of computer cryptography and challenge those who wish to explore the high-level math appendix.

Divided into four parts, the book explains secret keys and secret key methods like DES, public and private keys, and public key methods like RSA; how keys are distributed through digital certificates; and three real-world systems. Numerous graphics illustrate and clarify common cryptographic terminology throughout.

You will find coverage of such specific topics as:
  • Secret key and secret key exchanges
  • Public and private keys
  • Digital signatures
  • Digital certificates, Public Key Infrastructure (PKI), and PGP
  • Hashes and message digests
  • Secure e-mail, secure socket layer (SSL), and Internet Protocol Security (IPsec)
  • Protecting keys
  • Cryptographic attacks
  • Authentication, confidentiality, integrity, and nonrepudiation

"Even after ten years working in the field of information protection for a major electronics manufacturing company, I learned a lot from this book. I think you will too."

--From the Foreword by John Kinyon



0201616475B04062001

About the Author

H.X. Mel consults and develops computer systems for organizations such as Lucent, Xerox, MIT, the U.S. Government, Motorola, Goldman Sachs, and PricewaterhouseCoopers. Doris Baker is a freelance technical writer and editor.

0201616475AB04062001


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

The authors did a remarkable job by making complex concepts easy to understand.
Linda Zarate
While the book is good as an introduction to cryptography, it requires you read complete chapters and depends on this for future chapters.
K. Conner
If you need to quickly get up-to-speed on HIPAA or e-commerce security then this book is the best place to start.
Mike Tarrani

Most Helpful Customer Reviews

28 of 29 people found the following review helpful By Linda Zarate on December 17, 2001
Format: Paperback
This book clearly explains the foundation of cryptography, numbers, and the techniques that have emerged to provide modern security technologies. The book starts with Part I, that sets the context by introducing terms and the basics, including ciphers, data encryption standard (DES) and secret keys. The authors did a remarkable job by making complex concepts easy to understand. The next two parts go into more detail about public keys and digital certificates. While these are relatively simple to learn on the surface, the details have always eluded me until I read this book because more papers and books on the subject get too deep into details too fast and assume knowledge of advanced math on the part of the reader. Not so this book - the authors make it easy through clear writing, illustrations that illuminate the textual descriptions and a knack for explaining the complex in simple and easily digestible chunks.
I especially liked Part IV, which covers secure electronic commerce because it covered the full spectrum of technologies and the information is immediately useful to all IT and security professionals. Like in the first three parts of this book I came away with a complete understanding of how everything works.
This book epitomizes clear writing. Moreover, it is simply amazing how much knowledge can be relatively painlessly gained from reading this book. Although I am sure the authors intended to make the inner workings of cryptography accessible to non-security professionals (which they unquestionably accomplished), they also set a standard of excellence in technical writing by producing a book that is, in my opinion, near perfect in its ability to seamlessly use lively prose and well thought out illustrations to convey highly technical information. If you need to learn cryptography but are challenged by the math and the impenetratable writing of other books on the subject, start with this one.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
20 of 22 people found the following review helpful By Richard Bejtlich on March 30, 2001
Format: Paperback
I am a senior engineer for managed network security operations. I administer systems which use cryptographic tools and processes (SSH, IPSec VPNs, etc.) and have seen cryptography hinder my network-based intrusion detection activities. I read this book to gain basic familiarity with the nuts and bolts of cryptography. I wanted a lively text which addressed modern issues, since computer books can be quickly overtaken by technological advances. This book delivers at all levels and belongs on every computer security professional's bookshelf.
I thoroughly enjoyed this book. It was energetic, clear, well-organized, fully illustrated, and comprehensive. I believe it's THE book to read if you want an introduction to one of the major enablers of modern computing. Furthermore, because the book's goal is to explain the foundations of both secret and public key cryptography, it should stay relevant for many years.
"Cryptography Decrypted" does not spare any effort to ensure the reader understands the subject. Concepts are clarified and reinforced through text and diagrams on nearly every page. The authors know many readers are not attracted to mathematics, so they move the "heavy lifting" to an appendix. Even then, for readers willing to apply a little effort, the appendix is understandable and enlightening. At every stage of writing this book, the authors must have remembered to keep the non-cryptographer reader in mind. Kudos to their editors for keeping them on track!
The only disappointment was the book's failure to mention the Secure Shell (SSH). Because the authors believed it important to discusses popular implementations of cryptography (IPSec, SSL, PGP), I had hoped that SSH would be included.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 11 people found the following review helpful By Mike Tarrani HALL OF FAMETOP 10 REVIEWER on March 16, 2001
Format: Paperback
The primary audience for this book is anyone who has to quickly get up-to-speed in security infrastructure and cryptology. If you are working in health care and are overwhelmed with the technical requirements imposed by the Health Insurance Portability and Accountability Act (HIPAA), then you are going to love this book. If you are involved in e-commerce you will definitely find this book essential reading and the key to understanding the underpinnings of web and e-commerce security.
There is another audience for this book: technical writers. The authors set the highest standards in document design, clear writing and integration of prose and illustration. They have managed to explain a complex, difficult subject easy to understand.
Part I of the book lays the foundation by explaining the basics: defining terms, the evolution of ciphers and how they worked, and the fundamentals of the data encryption standard (DES) and secret keys. I found this part of the book to be fascinating because the authors used easy-to-follow examples that were augmented by visual depictions of how everything works. For example, a quick explanation of Polybius square numbers and how to transpose them to diffuse a cipher was not only something completely new to me, but was something I was able to thoroughly understand after reading less than three pages of this book! I am sure that a professional cryptographer would find this material basic. I found it empowering because I began to see a larger picture of this obscure science unfold while learning some interesting numerical manipulation techniques. For the first time I really understood this stuff to the degree that I could explain it to non-technical people. The authors also used historical anecdotes to make the subject interesting.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews