Full description not available
U**N
Bueno
Tema novedoso y de actualizar todo el tiempo, buen libro cumplió con las expectativas esperadas.
A**R
Math heavy, but okay.
I didn’t use this text for much else besides class assignments. It’s very math heavy, in spite of having a math undergrad degree 😰
A**R
Good
Good for school
A**R
Great book . Quick delivery
Great book . Quick delivery
T**Y
Great history/theory/vulnerability...but the math portion needs some work
I had to read this for a class. Thankfully my class didn't get into the math. The bad part is that the math is everywhere, so you have to skip around. It would be better to have four parts per chapter. The reference/design part, the in-use part, the math part, and then the ways in which to attack the encryption.The author loves to create formulas. Somewhere in the book it says something like: The number of X is the average of A and B; thus we have X = A + B / 2 (1.3). Thank you for telling me how to compute an average, because I didn't know the equation...But the problem is that the math then gets pretty intense, so unless you remember a lot of matrix math and binary/octal math, then you need to refer to the appendix. There is no "medium"; it's too easy and then too hard.Ignoring the math (Most of the book), the background information and theory are very helpful. The author is incredibly smart, and probably had a tough time 'dumbing it down' to us mere mortals.
B**O
Five Stars
Good
A**R
Stay away if you actually want to learn
The first chapter will lure you in with its great formatting. After that the book goes massively downhill, chapter 2 will leave you more confused than you started with. The problems at the end of the chapter don't even follow the structure of the chapter. Some of them especially the ones related to modular math weren't put in the lowest terms which makes them look more difficult than they are.All of this doesn't even begin to help when the author introduces an example it takes 2-3 more examples to fully understand the first example. Nested examples are about as wonderful as "GOTO" statements in Basic.This author needs an editor for the book that will make it easy to understand the principles and practice of cryptography and network security easy enough for a layperson to understand. This book looks like it was just stamped through for publishing without any proof reading.It's a shame on Pearson and this Author to allow such a book to be published
M**S
Good book, but sometimes it's hard to follow
Good book, but sometimes it's hard to follow. I use it more as a reference after reading my other Cryptography books.
TrustPilot
3天前
2 周前