Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition: provides the reader with a comprehensive survey of modern cryptography. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering practical cryptographic techniques, shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
Secrets and Lies: Digital Security in a Networked World (paper conversion): Provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Schneier's tutorial on just what cryptography (a subset of computer security) can and can not do for them, has received far-reaching praise from both the technical and business community is a popular chapter.
Practical Cryptography: is the ideal guide for an engineer or systems engineer or technology professional who wants to learn how to actually incorporate cryptography into a product. This book bridges the gap between textbook cryptography and cryptography in the real world.