100 Best Cryptography Books of All Time

We've researched and ranked the best cryptography books in the world, based on recommendations from world experts, sales data, and millions of reader ratings. Learn more

Featuring recommendations from Marc Andreessen, Brad Feld, Elon Musk, and 42 other experts.
1
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear...
more
Recommended by Stephen Kinsella, and 1 others.

Stephen Kinsella@gavreilly @SLSingh Love that book (Source)

See more recommendations for this book...

2

Cryptonomicon

With this extraordinary first volume in an epoch-making masterpiece, Neal Stephenson hacks into the secret histories of nations and the private obsessions of men, decrypting with dazzling virtuosity the forces that shaped this century.

In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detachment 2702. It is an outfit so secret that only a handful of people know it exists, and some of those people have names like Churchill and Roosevelt. The mission of Waterhouse and Detachment 2702—commanded by Marine...
more

Marc AndreessenThe Sovereign Individual—written 20 years ago, this is the most thought provoking book on the unfolding nature of the 21st Century that I’ve yet read. It’s packed with ideas on every page, many that are now fast becoming conventional wisdom, and many that are still heretical. Two related books to read are The Twilight of Sovereignty and Cryptonomicon. (Source)

Risto SiilasmaaThe one book on Siilasmaa's list is this fantasy offering from Neal Stephenson. The novel relates two parallel stories, one about an elite group of code-breakers in World War II, and another set in the present day, about two grandchildren of members of the group trying to track down a previously unknown – and rumored to be unbreakable – Nazi code. The book's subject matter resonates with current... (Source)

Nick HarkawayCryptonomicon is a real humdinger of a novel. Stephenson is a hugely enjoyable writer of action and comedy, I find him a joy to read. (Source)

See more recommendations for this book...

3
"…the best introduction to cryptography I've ever seen. … The book the National Security Agency wanted never to be published." –Wired Magazine

"…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal

"…easily ranks as one of the most authoritative in its field." —PC Magazine

"…the bible of code hackers." –The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers...
more
Recommended by Dominic Steil, and 1 others.

Dominic Steil[One of the five books recommends to young people interested in his career path.] (Source)

See more recommendations for this book...

4

Digital Fortress

When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant and beautiful mathematician. What she uncovers sends shock waves through the corridors of power. The NSA is being held hostage... not by guns or bombs, but by a code so ingeniously complex that if released it would cripple U.S. intelligence.

Caught in an accelerating tempest of secrecy and lies, Susan Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself...
more

See more recommendations for this book...

5
The magnificent, unrivaled history of codes and ciphers—how they're made, how they're broken, and the many and fascinating roles they've played since the dawn of civilization in war, business, diplomacy, and espionage—updated with a new chapter on computer cryptography and the Ultra secret.

Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the Pharaohs. For 4,000 years, fierce battles have been waged between codemakers and codebreakers, and the story of these battles is civilization's secret history, the hidden account of how wars...
more
Recommended by Tyler Cowen, and 1 others.

Tyler CowenI read this one quite young, and learned that problems are to be solved! I also developed some sense of what a history could look like and what a history should report. I recall my uncle thinking it deeply strange that a boy my age should be reading a book of such length. (Source)

See more recommendations for this book...

6

Cryptography Engineering

Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many... more

See more recommendations for this book...

7
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work.

Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and...
more
Recommended by Louis Nyffenegger, and 1 others.

Louis NyffeneggerFew technical books and a bit of everything. The following books are currently sitting on my bedside table: "The Hitchhiker's Guide To The Galaxy", "Predictable Revenue", "Manufacturing Consent", "Agile Application Security". "Oauth In Action", "Serious Cryptography". (Source)

See more recommendations for this book...

8
Harvard professor of symbology Robert Langdon awakens in an Italian hospital, disoriented and with no recollection of the past thirty-six hours, including the origin of the macabre object hidden in his belongings. With a relentless female assassin trailing them through Florence, he and his resourceful doctor, Sienna Brooks, are forced to flee. Embarking on a harrowing journey, they must unravel a series of codes, which are the work of a brilliant scientist whose obsession with the end of the world is matched only by his passion for one of the most influential masterpieces ever written, Dante... more

See more recommendations for this book...

9
WHAT IS LOST...
WILL BE FOUND


In this stunning follow-up to the global phenomenon The Da Vinci Code, Dan Brown demonstrates once again why he is the world's most popular thriller writer. The Lost Symbol is a masterstroke of storytelling - a deadly race through a real-world labyrinth of codes, secrets, and unseen truths...all under the watchful eye of Brown's most terrifying villain to date. Set within the hidden chambers, tunnels, and temples of Washington, DC., The Lost Symbol accelerates through a startling landscape toward an unthinkable...
more

See more recommendations for this book...

10

Permanent Record

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with...
more
Recommended by John Sargent, Kara Swisher, and 2 others.

John SargentEdward Snowden decided at the age of 29 to give up his entire future for the good of his country. He displayed enormous courage in doing so, and like him or not, his is an incredible American story. There is no doubt that the world is a better and more private place for his actions. Macmillan is enormously proud to publish Permanent Record. (Source)

Kara SwisherBtw @Snowden new book “Permanent Record” is quite good and surprisingly a love letter to the Internet as it was. (Source)

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
11
An ingenious code hidden in the works of Leonardo da Vinci.

A desperate race through the cathedrals and castles of Europe.

An astonishing truth concealed for centuries . . . unveiled at last.


While in Paris, Harvard symbologist Robert Langdon is awakened by a phone call in the dead of the night. The elderly curator of the Louvre has been murdered inside the museum, his body covered in baffling symbols. As Langdon and gifted French cryptologist Sophie Neveu sort through the bizarre riddles, they are stunned to discover a trail of clues hidden in the...
more
Recommended by Ev Williams, Neal O'Gorman, and 2 others.

Neal O'GormanCertainly, a previous non-business book which I really enjoyed (along with many other people) was the Da Vinci Code. I was living in the States at the time, and it was a rare occasion to be on a plane and not see someone reading it. (Source)

See more recommendations for this book...

12
Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo that ever lived, an American woman and her husband who invented the modern science of cryptology together and used it to confront the evils of their time, solving puzzles that unmasked Nazi spies and helped win World War II

In 1916, at the height of World War I, brilliant Shakespeare expert Elizebeth Smith went to work for an eccentric tycoon on his estate outside Chicago. The tycoon had close ties to the U.S. government, and he soon asked...
more

See more recommendations for this book...

14
In 1942, Leo Marks left his father's famous bookshop, 84 Charing Cross Road, and went off to fight the war. He was twenty-two. Soon recognized as a cryptographer of genius, he became head of communications at the Special Operations Executive (SOE), where he revolutionized the codemaking techniques of the Allies and trained some of the most famous agents dropped into occupied Europe, including "the White Rabbit" and Violette Szabo. As a top codemaker, Marks had a unique perspective on one of the most fascinating and, until now, little-known aspects of the Second World War.
Writing with...
more

See more recommendations for this book...

15

Alan Turing

The Enigma

Alan Turing (1912-54) was a British mathematician who made history. His breaking of the German U-boat Enigma cipher in World War II ensured Allied-American control of the Atlantic. But Turing's vision went far beyond the desperate wartime struggle. Already in the 1930s he had defined the concept of the universal machine, which underpins the computer revolution. In 1945 he was a pioneer of electronic computer design. But Turing's true goal was the scientific understanding of the mind, brought out in the drama and wit of the famous "Turing test" for machine intelligence and in his prophecy for... more
Recommended by George Dyson, and 1 others.

George DysonAlan Turing was born exactly 100 years ago, [editor’s note: this interview was done in 2012] and died aged 41. In those 41 years he led an amazing life that is covered with extraordinary grace, complexity and completeness by Andrew Hodges in this biography. It was first published in 1983 and remains in print. (Source)

See more recommendations for this book...

16
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions. less

See more recommendations for this book...

17
NATIONAL BESTSELLER

"Prodigiously researched and engrossing."---New York Times Book Review

"Fascinating.... Addictively readable."---Boston Globe


"Code Girls reveals a hidden army of female cryptographers, whose work played a crucial role in ending World War II.... Mundy has rescued a piece of forgotten history, and given these American heroes the recognition they deserve."---Nathalia Holt, bestselling author of Rise of the Rocket Girls


Recruited by the U.S. Army and Navy from small towns and...
more
Recommended by Bill Nye, and 1 others.

Bill NyeThe story of the remarkable women, including my mother, who served our country and helped shorten World War II. My mom is mentioned in the book. (Source)

See more recommendations for this book...

19

The Cuckoo's Egg

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error...
more
Recommended by Rick Klau, James Stanley, and 2 others.

Rick Klau@AtulAcharya @stevesi Same. Read it in college, realized I was more excited about the tech than what I was studying -- and Cliff did such a great job helping you understand what was going on. Such a great book. (Source)

James Stanley"The Cuckoo's Egg" by Clifford Stoll is another great book. I believe it's the first documented account of a computer being misused by a remote attacker. It talks about how Clifford attached physical teleprinters to the incoming phone lines so that he could see what the attacker was actually doing on the computer, and how he traced the attacker across several countries. (Source)

See more recommendations for this book...

20

An Introduction to Mathematical Cryptography

An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a specific area of mathematical cryptography and provides an extensive list of exercises.

It is a suitable text for advanced students in pure and applied mathematics and computer science, or the book may be used as a self-study. This book also provides a self-contained treatment of mathematical cryptography for the reader with limited mathematical background.
less

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
21
Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this revised and expanded second edition provides essential detail to get you started.

Bitcoin, the first successful decentralized digital currency, is still in its early stages and yet it's already spawned a multi-billion dollar global...
more
Recommended by Hong Qi Yu, Auston Bunsen, and 2 others.

Hong Qi Yu“Bitcoin and Cryptocurrencies Technologies” and “Mastering Bitcoin” provide a comprehensive yet not too intimidating introduction to the revolutionary yet often misunderstood concept of digital currency. (Source)

Auston BunsenThis [reading something helpful] happens with pretty much every book I read. Most recently it happened to me when I was reading “Mastering Bitcoin” by Andreas Antonoupolous. I had no idea what the components of a Bitcoin wallet address were and he elegantly explains them in detail in chapter 4. It’s particularly relevant because we started CBlocks and we focus almost exclusively on wallet... (Source)

See more recommendations for this book...

22

Enigma

"Radnja ovoga romana odvija se na pozadini stvarnog povijesnog događaja" - rečenica je iz piščeve napomene kojom se otvara ovaj roman, a čija istinitost odmah intrigira. Čitatelj biva uvučen u vrijeme Drugog svjetskog rata, u Bletchley Park, britansku tajnu bazu za presretanje njemačkih šifri. Iako izmišljeni, likovi su slojeviti, živopisni, a priča napeta i neizvjesna. Tom Jericko, razbijač šifri, odgonetava promjenu njemačke šifre za tajne operacije u Europi, a istovremeno rješava nestanak bivše djevojke koja je možda špijun! less

See more recommendations for this book...

23
For fans of Jacqueline Winspear, Laurie R. King, and Anne Perry, Mr. Churchill’s Secretary captures the drama of an era of unprecedented challenge—and the greatness that rose to meet it.

London, 1940. Winston Churchill has just been sworn in, war rages across the Channel, and the threat of a Blitz looms larger by the day. But none of this deters Maggie Hope. She graduated at the top of her college class and possesses all the skills of the finest minds in British intelligence, but her gender qualifies her only to be the newest typist at No. 10 Downing...
more

See more recommendations for this book...

24

Ghost in the Wires

My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is...

more

Richard BejtlichIn 2002 I reviewed Kevin Mitnick's first book, The Art of Deception. In 2005 I reviewed his second book, The Art of Intrusion. I gave both books four stars. Mitnick's newest book, however, with long-time co-author Bill Simon, is a cut above their previous collaborations and earns five stars. As far as I can tell (and I am no Mitnick expert, despite reading almost all previous texts mentioning... (Source)

Antonio EramThis book was recommended by Antonio when asked for titles he would recommend to young people interested in his career path. (Source)

Nick JanetakisI'm going to start reading Ghost in the Wires by Kevin Mitnick this week. I used to go to 2600 meetings back when he was arrested for wire fraud and other hacking related shenanigans in the mid 1990s. I'm fascinated by things like social engineering and language in general. In the end, I just want to be entertained by his stories. For someone who is into computer programming, a book like this... (Source)

See more recommendations for this book...

25
A million pages of new World War II codebreaking records have been released by the U.S. Army and Navy and the British government over the last five years. Now, Battle of Wits presents the history of the war that these documents reveal. From the battle of Midway until the last German code was broken in January 1945, this is an astonishing epic of a war that was won not simply by brute strength but also by reading the enemy's intentions.
The revelations of Stephen Budiansky's dramatic history include how Britain tried to manipulate the American codebreakers and monopolize German...
more

See more recommendations for this book...

26
Bletchley Park was where one of the war's most famous and crucial achievements was made: the cracking of Germany's Enigma code in which its most important military communications were couched. This country house was home to Britain's most brilliant mathematical brains, like Alan Turing, and the scene of immense advances in technology—indeed, the birth of modern computing. The military codes deciphered there were instrumental in turning both the Battle of the Atlantic and the war in North Africa. But, though plenty has been written about the scientists and the codebreaking,...
more

See more recommendations for this book...

27
Viruses. Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?

The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.

This edition updated with new information about post-9/11 security.
less

See more recommendations for this book...

28
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.

Digital Gold is New York Times reporter Nathaniel Popper’s brilliant and engrossing history of Bitcoin, the landmark digital money and financial technology that has spawned a global social movement.

The notion of a new currency, maintained by the computers of users around the world, has been the butt of many jokes, but that has not stopped it from growing into a technology worth...
more
Recommended by Linda Xie, Hong Qi Yu, and 2 others.

Linda XieWhat’s the one book you would recommend someone to read if they were interested in learning more about your industry? Mine would be Digital Gold by Nathaniel Popper. It’s a fascinating book about the early days of Bitcoin. (Source)

Hong Qi YuDigital gold presents the most extensive history of bitcoin thus far, making it an invaluable page-turner for crypto aficionados and newbies alike. This is a must read for anyone interested in understanding what many consider to be the greatest invention since the internet. (Source)

See more recommendations for this book...

29

Daemon (Daemon, #1)

A high-tech thriller for the wireless age that explores the unthinkable consequences of a computer program running without human control—a daemon—designed to dismantle society and bring about a new world order

Technology controls almost everything in our modern-day world, from remote entry on our cars to access to our homes, from the flight controls of our airplanes to the movements of the entire world economy. Thousands of autonomous computer programs, or daemons, make our networked world possible, running constantly in the background of our lives, trafficking e-mail,...
more
Recommended by Elon Musk, Eric Weinstein, and 2 others.

Elon MuskA great read. (Source)

Eric Weinstein[Eric Weinstein recommended this book on Twitter.] (Source)

See more recommendations for this book...

30
In this remarkable tour de force of investigative reporting, James Bamford exposes the inner workings of America's largest, most secretive, and arguably most intrusive intelligence agency. The NSA has long eluded public scrutiny, but The Puzzle Palace penetrates its vast network of power and unmasks the people who control it, often with shocking disregard for the law. With detailed information on the NSA's secret role in the Korean Airlines disaster, Iran-Contra, the first Gulf War, and other major world events of the 80s and 90s, this is a brilliant account of the use and abuse of... more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
31
The American ENIAC is customarily regarded as having been the starting point of electronic computation. This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during World War II--predates ENIAC by two years.
Colossus was built during the Second World War at the Government Code and Cypher School at Bletchley Park. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms that were employed during World War II remained in use by the...
more
Recommended by George Dyson, and 1 others.

George DysonAfter Enigma, the Germans developed more powerful encryption with higher-speed digital equipment that was much harder to break. The British side, led by [the engineer] Tommy Flowers, built a vacuum tube machine called Colossus – an extremely powerful and sophisticated digital computer which helped the British to break these even stronger codes. By the end of the war there were at least 10 of... (Source)

See more recommendations for this book...

33

Enigma

The Battle for the Code

Winston Churchill called the cracking of the German Enigma Code "the secret weapon that won the war." Now, for the first time, noted British journalist Hugh-Sebag-Montefiore reveals the complete story of the breaking of the code by the Allies--the breaking that played a crucial role in the outcome of World War II.

This fascinating account relates the never-before-told, hair-raising stories of the heroic British and American sailors, spies, and secret agents who faced death in order to capture vital codebooks from sinking ships and snatch them from under the noses of Nazi...
more

See more recommendations for this book...

34
I'm M, or at least that's how I'm known, and I'll be your guide.

The Herculean test of your grit is as follows: Find the word or phrase solution to each one of my encrypted logic puzzles, called Theorems. Doing so will earn you entry into the elite ranks of The Master Theorem. It may take you some time, but trust me—it’ll be worth it.

What's in it for you:
Read my cryptic ramblings alongside each encrypted logic puzzle, called a Theorem Decipher each puzzle to reveal the word or phrase answer Become an expert in codes, ciphers, and...
more

See more recommendations for this book...

35
For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field. less

See more recommendations for this book...

36
. . . both Gauss and lesser mathematicians may be justified in rejoic- ing that there is one science [number theory] at any rate, and that their own, whose very remoteness from ordinary human activities should keep it gentle and clean. - G. H. Hardy, A Mathematician's Apology, 1940 G. H. Hardy would have been surprised and probably displeased with the increasing interest in number theory for application to "ordinary human activities" such as information transmission (error-correcting codes) and cryptography (secret codes). Less than a half-century after Hardy wrote the words quoted above, it... more

See more recommendations for this book...

37
SSL/TLS is the cornerstone of security on the Internet, but understanding it and using it are not simple tasks. Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a... more

See more recommendations for this book...

38
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. less
Recommended by Ben Goldacre, and 1 others.

Ben Goldacre@szbalint it's such a great book, i've always said @rossjanderson should release it in chunks as pop science books. the massive textbook shape doesn't do its accessibility, readability and content justice! (Source)

See more recommendations for this book...

39
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the...
more

See more recommendations for this book...

40

Handbook of Applied Cryptography

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a... more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
41
Among the famous battles of World War II, the longest and most critical was the Battle of the Atlantic--the struggle between the American convoys bringing supplies to Britain and the German U-boats bent on severing that lifeline. No matter where else on earth conflicts raged, leaders on both sides understood that whoever won the Battle of the Atlantic would win the war. From the start, Germany had the advantage with the diabolically devised encryption machine known as Enigma. Breaking the Enigma codes became the singleminded obsession of a brilliant band of mathematicians, chess champions,... more

See more recommendations for this book...

42
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.

The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate...
more

See more recommendations for this book...

43

The Zimmermann Telegram

The Proud Tower, the Pulitzer Prize–winning The Guns of August, and The Zimmermann Telegram comprise Barbara W. Tuchman’s classic histories of the First World War era
 
In January 1917, the war in Europe was, at best, a tragic standoff. Britain knew that all was lost unless the United States joined the war, but President Wilson was unshakable in his neutrality. At just this moment, a crack team of British decoders in a quiet office known as Room 40 intercepted a document that would change history. The Zimmermann telegram was a...
more

See more recommendations for this book...

44
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more...
more

See more recommendations for this book...

45

Codebreakers

The Inside Story of Bletchley Park

Familiar to anyone versed in the history of World War II or interested in the study of modern intelligence work, Bletchley Park was arguably the most successful intelligence operation in world history, the top secret workplace of the remarkable people who cracked Germany's vaunted Enigma Code. Almost to the end of the war, the Germans had firm faith in the Enigma ciphering machine, but in fact the codebreakers were deciphering nearly 4,000 German transmissions daily by 1942, reaping a wealth of information on such important matters as the effort to resupply Rommel's army in North Africa and... more

See more recommendations for this book...

46
'Station X' tells the true story, as it has never beeen told before, of the amazing achievements of the codebreakers working at Bletchley Park in the Second World War.

In 1939 several hundred people - students, professors, international chess players, junior military officers, actresses and debutantes - reported to a Victorian mansion in Buckinghamshire: Bletchley Park. This was to be 'Station X', the Allies' top-secret centre for deciphering enemy codes.

Their task was to break the ingenious Enigma cypher used for German high-level communications. The settings for the...
more

See more recommendations for this book...

47
The National Security Agency is the world’s most powerful, most far-reaching espionage. Now with a new afterword describing the security lapses that preceded the attacks of September 11, 2001, Body of Secrets takes us to the inner sanctum of America’s spy world. In the follow-up to his bestselling Puzzle Palace, James Banford reveals the NSA’s hidden role in the most volatile world events of the past, and its desperate scramble to meet the frightening challenges of today and tomorrow.

Here is a scrupulously documented account–much of which is based on unprecedented...
more

See more recommendations for this book...

48

The American Black Chamber

During the 1920s Herbert O. Yardley was chief of the first peacetime cryptanalytic organization in the United States, the ancestor of today's National Security Agency. Funded by the U.S. Army and the Department of State and working out of New York, his small and highly secret unit succeeded in breaking the diplomatic codes of several nations, including Japan. The decrypts played a critical role in U.S. diplomacy. Despite its extraordinary successes, the Black Chamber, as it came to known, was disbanded in 1929. President Hoover's new Secretary of State Henry L. Stimson refused to continue its... more

See more recommendations for this book...

49
0470226269|9780470226261. Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography published in the year 2007 was published by John Wiley & Sons. The author of this book is Bruce Schneier . ed page displaying collection of Bruce Schneier books here. This is the Paperback version of the title "Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography ". Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography is currently Available with... more

See more recommendations for this book...

50
In the tradition of Simon Winchester and Dava Sobel, The Riddle of the Labyrinth: The Quest to Crack an Ancient Code tells one of the most intriguing stories in the history of language, masterfully blending history, linguistics, and cryptology with an elegantly wrought narrative. When famed archaeologist Arthur Evans unearthed the ruins of a sophisticated Bronze Age civilization that flowered on Crete 1,000 years before Greece's Classical Age, he discovered a cache of ancient tablets, Europe's earliest written records. For half a century, the meaning of the inscriptions, and even the language... more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
51
Recommended by Matt Odell, and 1 others.

Matt Odell@figsOS @CashApp @MartyBent Love it. Now tell him/her to go read @skwp's new book. Great place to start. https://t.co/pGk00Bp3V0 (Source)

See more recommendations for this book...

52

Explorer Academy Codebreaking Activity Adventure

Unlock ancient puzzles and secrets introduced via supercool codes and ciphers in this companion book to the new Explorer Academy series.

In the first activity book based on the Explorer Academy, kids test their knowledge of ancient codes and ciphers in a series of head-scratching puzzles designed to outwit even the most clever cryptographers. When kids successfully navigate the codes, they are rewarded with a first-class tour of the Academy.

Kids will have a blast, teaming up with the characters from the series and learning firsthand from the world's most renowned...
more

See more recommendations for this book...

53
A sweeping history of the NSA and its codebreaking from its roots in World War II through the end of the Cold War.

The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in...
more

See more recommendations for this book...

54
A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused... more
Recommended by Ev Williams, and 1 others.

See more recommendations for this book...

55
Throughout World War II, in the conflict fought against Japan, Navajo code talkers were a crucial part of the U.S. effort, sending messages back and forth in an unbreakable code that used their native language. They braved some of the heaviest fighting of the war, and with their code, they saved countless American lives. Yet their story remained classified for more than twenty years.

Joseph Bruchac brings their stories to life for young adults through the riveting fictional tale of Ned Begay, a sixteen-year-old Navajo boy who becomes a code talker. His grueling journey is...
more

See more recommendations for this book...

56
World-renowned Harvard symbologist Robert Langdon is summoned to a Swiss research facility to analyze a cryptic symbol seared into the chest of a murdered physicist. What he discovers is unimaginable: a deadly vendetta against the Catholic Church by a centuries-old underground organization -- the Illuminati. In a desperate race to save the Vatican from a powerful time bomb, Langdon joins forces in Rome with the beautiful and mysterious scientist Vittoria Vetra. Together they embark on a frantic hunt through sealed crypts, dangerous catacombs, and deserted cathedrals, and into the depths of... more

See more recommendations for this book...

57
From the time of the ancient pharaohs to the modern world of Internet banking, civilization has relied on codes and ciphers to keep its secrets. The 4,000-year history of cryptography has been a kind of arms race: Each time a more complex encryption has been developed, it has been attacked and, more often than not, decoded; and each time, in response, codemakers have produced tougher and tougher codes. Codebreaker surveys the entire history of codes through an eloquent narrative and an evocative range of illustrations, paying special attention to famous codes that have never been... more

See more recommendations for this book...

58
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...
more

See more recommendations for this book...

59
Examining the espionage and intelligence stories in World War II, on a global basis, bringing together the British, American, German, Russian and Japanese histories.

There were two Second World Wars: one fought on the battlefields, and another conducted by men and women few of whom ever fired a weapon in anger, but whose efforts vastly influenced the conflict.

‘The Secret War 1939-45’ examines that other war waged by British, American, German, Russian and Japanese intelligence-gathering personnel. Moving chronologically through the conflict, Max Hastings charts the...
more

See more recommendations for this book...

60
This comprehensive code comprises all building, plumbing, mechanical, fuel gas and electrical requirements for one- and two-family dwellings and townhouses up to three stories. The IRC contains many important changes such as: An updated seismic map reflects the most conservative Seismic Design Category (SDC) based on any soil type and a new map reflects less conservative SDCs when Site Class A, B or D is applicable. The townhouse separation provisions now include options for using two separate fire-resistant-rated walls or a common wall. An emergency escape and rescue opening is no longer... more
Recommended by Alan Pierce, and 1 others.

Alan PierceThis is a great book for overall understanding of primarily modern western building and the many different building styles and materials employed. (Source)

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
61

Cryptography

A Very Short Introduction

This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated... more

See more recommendations for this book...

63
In Cracking Codes with Python, you'll learn how to program in Python while making and breaking ciphers, which are used to encrypt secret messages. (No programming experience required!).
After a quick crash course in programming, you'll make, test, and hack classic cipher programs. You'll begin with simple programs like the Caesar cipher and then work your way up to public key cryptography and the RSA cipher, which is used for modern secure data transmissions.
Each program comes with the full code and a line-by-line explanation of how things work. By book's end, you'll...
more

See more recommendations for this book...

64

In Code

A Mathematical Journey

In January 1999, Sarah Flannery, a sports-loving teenager from Blarney in County Cork, Ireland, was awarded Ireland's Young Scientist of the Year for her extraordinary research and discoveries in Internet cryptography. The following day, her story began appearing in Irish papers and soon after was splashed across the front page of the London Times, complete with a photo of Sarah and a caption calling her "brilliant." Just sixteen, she was a mathematician with an international reputation. IN CODE is a heartwarming story that will have readers cheering Sarah on. Originally published in England... more

See more recommendations for this book...

65

The Hut Six Story

Breaking the Enigma Codes

"Gordon Welchman worked at Bletchley Park, on the most important British de-ciphering operations of the war [WW2], from 1939 to 1945. Here, unsuspected by the Germans, the famous Enigma codes were broken, almost continuously throughout the war. Welchman was a leading figure at Bletchley Park; his brilliant mathematical mind, and imaginative attack on apparently insuperable problems, were of inestimable value in shaping the course of the war and hastening victory.

No other book has explained so thoroughly how the job was done, and how so often a flash of genius, an inspired...
more

See more recommendations for this book...

68
In the year 1689, a cabal of Barbary galley slaves -- including one Jack Shaftoe, aka King of the Vagabonds, aka Half-Cocked Jack -- devises a daring plan to win freedom and fortune. A great adventure ensues -- a perilous race for an enormous prize of silver ... nay, gold ... nay, legendary gold.

In Europe, the exquisite and resourceful Eliza, Countess de la Zeur, is stripped of her immense personal fortune by France's most dashing privateer. Penniless and at risk from those who desire either her or her head (or both), she is caught up in a web of international intrigue, even as...
more

See more recommendations for this book...

69
Gordon Welchman was one of Bletchley Park's most important figures. Like Turing, his pioneering work was fundamental to the success of Bletchley Park and helped pave the way for the birth of the digital age. Yet, his story is largely unknown to many. This book draws on Welchman's personal papers and correspondence with wartime colleagues which lay undisturbed in his son's loft for many years. Packed with fascinating new insights, including Welchman's thoughts on key Bletchley figures and the development of the Bombe machine, this book sheds light on the clandestine activities at Bletchley... more

See more recommendations for this book...

70

Hacking

The Art of Exploitation

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C...
more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
71

Practical Cryptography in Python

Learning Correct Cryptography by Example

Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.


Cryptography is the lifeblood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and...
more

See more recommendations for this book...

72

The Voynich Manuscript

The first authorized copy of this mysterious, much-speculated-upon, one-of-a-kind, centuries-old puzzle. The Voynich Manuscript is produced from new photographs of the entire original and accompanied by expert essays that invite anyone to understand and explore the enigma.

Many call the fifteenth-century codex, commonly known as the “Voynich Manuscript,” the world’s most mysterious book. Written in an unknown script by an unknown author, the manuscript has no clearer purpose now than when it was rediscovered in 1912 by rare books dealer Wilfrid Voynich. The...
more

See more recommendations for this book...

73
As a young Navajo boy, Chester Nez had to leave the reservation and attend boarding school, where he was taught that his native language and culture were useless. But Chester refused to give up his heritage. Years later, during World War II, Chester—and other Navajo men like him—was recruited by the US Marines to use the Navajo language to create an unbreakable military code. Suddenly the language he had been told to forget was needed to fight a war. This powerful picture book biography contains backmatter including a timeline and a portion of the Navajo code, and also depicts the life of an... more

See more recommendations for this book...

74
For the first time ever, veteran World War II cryptographer Hervie Haufler details how American and British codebreakers were the decisive factor in the Allied victory. From the Purple Machine to the Navajo Talkers to the breaking of Japan's JN-25 Naval Code to the shadowy world of decoding units like Hut-8 in Bletchley Park, he shows how crucial information-often obtained by surreptitious and violent means-was the decisive edge in the Battle of Britain, at Midway and against the U-Boats in the North Atlantic, and how Allied intelligence saved the Soviet Union from almost certain defeat. more

See more recommendations for this book...

75
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. Rather than describing ad-hoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving... more

See more recommendations for this book...

76

Large Print Cryptograms #2

Hard on the brain, easy on the eyes!

Challenging, baffling, and absorbing, these cryptograms are easy to read in large-size print. The strings of seemingly meaningless letters are actually carefully coded messages that will test and stimulate your wordplay skills. You don't have to be a professional code breaker or super spy to figure them out, and there's no need to struggle while reading them. All you have to do is enjoy solving the puzzles!
less

See more recommendations for this book...

77
"Views differ on bitcoin, but few doubt the transformative potential of Blockchain technology. The Truth Machine is the best book so far on what has happened and what may come along. It demands the attention of anyone concerned with our economic future." --Lawrence H. Summers, Charles W. Eliot University Professor and President Emeritus at Harvard, Former Treasury Secretary

From Michael J. Casey and Paul Vigna, the authors of The Age of Cryptocurrency, comes the definitive work on the Internet's Next Big Thing: The Blockchain.
more

Kevin WerbachThey’re journalists who are good at telling a story. They explain the possibilities of blockchain and hone in on the broader potential—this idea of a truth machine. It’s the idea that what’s going on here is more than just the specific applications of blockchain—that this might be a fundamentally new mechanism of achieving agreement and consensus about the state of the world, in a decentralized... (Source)

Tyler WinklevossAwesome chat last night with @paulvigna and @mikejcasey, two of the greatest minds in cryptocurrency. Check out their new book #TheTruthMachine https://t.co/ciTEhpXnes https://t.co/B8PuEdFqoj (Source)

Jeremy GardnerI’ll never pump a coin, but I’ll always promote good writers. It was great catching up with @mikejcasey and hearing about “The Truth Machine,” his new book with @paulvigna. It’s sure to be full of insights on the most revolutionary technology since the internet! https://t.co/CYok1K747N (Source)

See more recommendations for this book...

79
In a world of secrets, human genius is power.
And sometimes it is simply deadly...
A three-hour drive from Washington, D.C., two clandestine institutions face each other across a heavily guarded river. One is the world's most unusual laboratory, whose goals and funding are a mystery. The other is an elite CIA training camp shrouded in secrecy. Now a man and a woman are about to run a gauntlet between these two puzzle factories, straight into a furious struggle to exploit a potentially world-shattering discovery--and keep some other secrets underwraps forever...
Former secret...
more

See more recommendations for this book...

80
In 1912, Wilfrid Voynich, an antiquarian book dealer, stumbled upon a strange volume, its vellum pages covered in a beautiful but unrecognisable script accompanied by equally mystifying pictures. The codex has remained undeciphered from that day to this. Voynich believed the codex to be the work of medieval philosopher Roger Bacon, others that of the Elizabethan mathematician and occultist John Dee. Whoever created the book—which now resides at Yale University—it remains to this day a singular enigma which continues to defy the best efforts of linguists, cryptologists, and scholars. With the... more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
82
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.



After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption...
more

See more recommendations for this book...

84

Top Secret

A Handbook of Codes, Ciphers and Secret Writing

"The author's upbeat, positive tone is refreshing and his enthusiasm about his topic is contagious." — SCHOOL LIBRARY JOURNAL (starred review)

Pssst! Do you know the difference between a code and a cipher? Can you tell a St. Cyr slide from a Cardano grille? Did you know that the discovery of a substitution cipher caused Mary Queen of Scots to lose her head? Don't look now, but packed into this practical field guide is everything a young person needs to know about the art of concealment - making and breaking codes, mastering cipher systems, and experimenting with secret...
more

See more recommendations for this book...

85
In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a... more

See more recommendations for this book...

86
THE LEGACY...
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the...
more

See more recommendations for this book...

87
Prepare for the challenging CySA+ certification exam with this money-saving, comprehensive study package
Designed as a complete self-study program, this collection offers a variety of proven resources to use in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam. Comprised of CompTIA CySA+ Cybersecurity Analyst Certification All-In-One Exam Guide (CS0-001) and CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-001), this bundle thoroughly covers every topic on the exam.
CompTIA CySA+ Cybersecurity Analyst...
more

See more recommendations for this book...

89
A world of "smart" devices means the Internet can kill people. We need to act. Now.

Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers—from home thermostats to chemical plants—are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world.

As we open our lives to this future, often called the Internet of Things, we are beginning to see its enormous potential in ideas like driverless cars, smart cities, and personal agents equipped...
more
Recommended by Alexander Stubb, and 1 others.

Alexander StubbI will get this book. Looks interesting beyond the title...Click Here to Kill Everybody by Bruce Schneier via @FT https://t.co/GGCRlsTflT (Source)

See more recommendations for this book...

90
Technological innovation will be the best and the encouraging part of our phase of the Industrial Revolution. Intelligent robotics, 3D printing, autonomous vehicles, nanotechnology, biotechnology, digital fabrication, synthetic biology, computation design, energy storage, quantum computing and the Internet of Things will be the milestones set in the latest Industrial Revolution.

Undeniably, one of the most hyped technologies of our era, is the “Blockchain” technology and digital currencies: a technology that promises more digitalised and decentralised economies. Recently,...
more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
91
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.

Coverage includes:
more

See more recommendations for this book...

93

The Rule of Four

An ivy league murder, a mysterious coded manuscript, and the secrets of a Renaissance prince collide memorably in The Rule of Four -- a brilliant work of fiction that weaves together suspense and scholarship, high art and unimaginable treachery.

It's Easter at Princeton. Seniors are scrambling to finish their theses. And two students, Tom Sullivan and Paul Harris, are a hair's breadth from solving the mysteries of the Hypnerotomachia Poliphili--a renowned text attributed to an Italian nobleman, a work that has baffled scholars since its publication in 1499. For Tom, their...
more

See more recommendations for this book...

94

Criptonomicón III

El código Aretusa

En 1942, Lawrence Pritchard Waterhouse, genio matemático y capitán de la marina estadounidense, colabora con Allan Turing y los especialistas británicos de Bletchley Park en el trabajo de descifrar los códigos secretos de las potencias del Eje. Sesenta años más tarde, la empresa de su nieto y también brillante cripto-hacker, Randy Waterhouse, proyecta crear la Cripta, un nuevo paraíso de datos y el mayor exponente de la libertad informática.

Al final, ni siquiera Wagner o el "oro del Rhin" han de resultar ajenos a la plural y camaleónica trama de Criptonomicón, un tour de force...
more

See more recommendations for this book...

95
No, it's not a message from outer space! Just read it backwards, starting from the bottom line, to discover what this specially coded message says. (The extra letter "X" at the beginning was thrown in just to make the message a bit more mysterious.)
Codes have been used for centuries. Now, with the help of this entertaining book, you, too, will be able to decipher dozens of secret messages. Veteran cryptographer Bud Johnson not only describes the different techniques used in secret writing but also explains — clearly and simply — how to make and break six different kinds of codes: simple...
more

See more recommendations for this book...

96

Codes, Ciphers and Secret Writing

"A fascinating, challenging book." ― A.L.A. Booklist
Learn to use the most important codes and methods of secret communication in use since ancient times. Cipher and decipher codes used by spies. Explore the famous codes that changed the fate of nations and political leaders. And enjoy hours of fun experimenting with cryptography ― the science of secret writing.
Beginning with simple letter substitutions and transposition ciphers, world-famous science writer Martin Gardner explains how to break complicated polyalphabetical ciphers and codes worked with grids, squares,...
more

See more recommendations for this book...

97

PopCo

PopCo tells a story of twenty-nine-year-old Alice Butler, a quirky, fiercely intelligent loner with an affinity for secret codes and mathematics. She works for the huge toy company named PopCo, where she creates snooping kids' kits - KidSpy, KidTec and KidCracker. At the company conference Alice and her colleagues are brought into developing the ultimate product for the teenage girls. less

See more recommendations for this book...

98

Gray Hat Hacking

The Ethical Hacker's Handbook

Up-to-date strategies for thwarting the latest, most insidious network attacks

This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Based on critical topics that the authors teach at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition,...
more

See more recommendations for this book...

99
For the first time, the inside story of the brilliant American engineer who defeated Enigma and the Nazi code-masters

Much has been written about the success of the British “Ultra” program in cracking the Germans’ Enigma code early in World War II, but few know what really happened in 1942, when the Germans added a fourth rotor to the machine that created the already challenging naval code and plunged Allied intelligence into darkness.

Enter one Joe Desch, an unassuming but brilliant engineer at the National Cash Register Company in Dayton, Ohio, who was given...
more

See more recommendations for this book...

Don't have time to read the top Cryptography books of all time? Read Shortform summaries.

Shortform summaries help you learn 10x faster by:

  • Being comprehensive: you learn the most important points in the book
  • Cutting out the fluff: you focus your time on what's important to know
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.