<< 1 >>
Rating:  Summary: Still quite good! Review: I got hold of a copy from a friend who also bought one. I was told that this was a classic, and sure it is. I'd not use it today for Cryptografy education (New stuff evolves every month), but it DO contains alot of other gems, still very intresting today which you could use for education - If you can get hold of a copy i suggest that you buy it asap!
Rating:  Summary: From Go to Woo. Review: I read this book while my husband was studying honours year computer science. It was,in one word, readable. I could understand it, and it gave me a good grasp of the field and a better appreciation of what specialists in computer science actually do with this stuff. I am not a computer scientist, but like to be active in understanding what my husband is up to, and I could take this book in. So, while it is probably not for the complete novice, I found it educational for an arts grad who has obtained all of her information on computing osmotically. Great read, when will it be in print again. I lent my copy and it never came back home.
Rating:  Summary: From Go to Woo. Review: I read this book while my husband was studying honours year computer science. It was,in one word, readable. I could understand it, and it gave me a good grasp of the field and a better appreciation of what specialists in computer science actually do with this stuff. I am not a computer scientist, but like to be active in understanding what my husband is up to, and I could take this book in. So, while it is probably not for the complete novice, I found it educational for an arts grad who has obtained all of her information on computing osmotically. Great read, when will it be in print again. I lent my copy and it never came back home.
Rating:  Summary: A timeless invaluble book for cryptography and data security Review: This is one of the first book in this field. It was one of the most cited book. This book deals with cryptography with algorithm approches. Apart from cryptography, data security, especially for secure operating systems, is presented. I got a copy of the book in the early 1980s when I was a student. I also taught cryptography with it. I would like to recommend the book as the first book to be read for a student with interest in cryptography.
<< 1 >>
|