Applied Cryptography is an overview of cryptography’s many use cases, which go beyond encoding and decoding information. Author Bruce Schneier covers general classes of cryptographic protocols and detailed techniques to explain the inner workings of cryptographic algorithms.
His book explains how programmers and electronic communications experts can use cryptography to maintain strong computer security. In addition to describing algorithms, it gives advice on how to integrate them into cryptographic software, and demonstrates how they can be used to solve security problems.
Threat Modeling: Designing for Security provides advice on how to integrate strong security measures into the design of systems, software, and services. Security pros can learn more about different approaches to threat modeling, how to test their designs against threats, and effective ways to address threats.