Best Cryptography Books

24 books on the list
Sort by
Number of Articles
Layout
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive...
Appears in 3 articles
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, t...
Appears in 2 articles
Recommended by
Stephen KinsellaFrom the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know abou...
Appears in 2 articles
Handbook of Applied Cryptography
Goodreads Rating
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data comm...
Appears in 2 articles
Cryptonomicon
Goodreads Rating
With this extraordinary first volume in an epoch-making masterpiece, Neal Stephenson hacks into the secret histories of nations and the private obsessions of men, decrypting with dazzling virtuosity the forces that shaped this century.In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detach...
Appears in 1 article
Code Talker
The First and Only Memoir By One of the Original Navajo Code Talkers of WWII
Goodreads Rating
He is the only original World War II Navajo code talker still alive—and this is his story . . .His name wasn’t Chester Nez. That was the English name he was assigned in kindergarten. And in boarding school at Fort Defiance, he was punished for speaking his native language, as the teachers sought to rid him of his culture and traditions. But discrim...
Appears in 1 article
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work....
Appears in 1 article
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.Network security monitoring is based on the principle that prevention eventually fails. In the current threat land...
Appears in 1 article
Snow Crash
Goodreads Rating
After the Internet, what came next?Enter the Metaverse - cyberspace home to avatars and software daemons, where anything and just about everything goes. Newly available on the Street - the Metaverse's main drag - is Snow Crash, a cyberdrug. Trouble is Snow Crash is also a computer virus - and something more. Because once taken it infects the person...
Appears in 1 article
An Introduction to Mathematical Cryptography
Goodreads Rating
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Appears in 1 article
A Course in Number Theory and Cryptography
Goodreads Rating
. . . both Gauss and lesser mathematicians may be justified in rejoic- ing that there is one science [number theory] at any rate, and that their own, whose very remoteness from ordinary human activities should keep it gentle and clean. - G. H. Hardy, A Mathematician's Apology, 1940 G. H. Hardy would have been surprised and probably displeased with ...
Appears in 1 article
Network Monitoring and Analysis by
Top Secret by Paul B. Janeczko
Network Security with pfSense by Manuj Aggarwal
Defensive Security Handbook by Lee Brotherston
Battle of Wits by Stephen Budiansky
Cryptography and Network Security by William Stallings
Cryptography and Network Security by William Stallings
The Keys of Egypt by Lesley Adkins
Introduction to Modern Cryptography by Jonathan Katz
Network Security Essentials by W. STALLINGS
Cryptography by Douglas R. Stinson
Alan Turing by Andrew Hodges
Modern Cryptography by