daaaid.blogg.se

Cryptography and network security forouzan
Cryptography and network security forouzan





The examples in the book are at best piecemeal in design with very few (if any) clear step by step instructions but instead refers to elements from other piecemeal examples previously presented and you end up chasing your tail and wasting your valuable time.Īgain - IF you are a MATH MAJOR and a PROGRAMMING whiz AND College level AND while Im at it. Heres a link to the publisher's site for the errata if you'd like to see for yourself. I worked on a DES problem for several hours by hand as required before I found the mistake within the 'example' in the book only to find out I ran out of time and STILL had to the problem for my class. The problem is, you dont find out until hours later that there WAS an issue.

cryptography and network security forouzan cryptography and network security forouzan

It's loaded with errors and errata and lacks any consise+clear examples Im not speaking of slight errors either, these are formula errors which can throw a 100 step problem right into the circular file in due time. A solid foundation in encoding and encryption at the encoding level (as it assumes you know DISCRETE MATH, and made it through Differenctial Calculus and know a significant amount about a variety of programming languages) In my opinion, you might wish to be BOTH the above if you intend to make real use of the material. NOTE: This book more or less assumes that you are either:Ī Computer Science Graduate with a MAJOR interest in encoding and encryption.Ī math major who would rather discuss the virtues of MOD % in C# or C++ as a past time.







Cryptography and network security forouzan