Vol. III · Issue 06 · May 2026ISSN 2814-9921
Applied Cryptography for Backend Engineers
PDF·EPUB·Lifetime updates
Security & Cryptography · 1st Edition · November 2025

Applied Cryptography for Backend Engineers

Stop rolling your own, and stop ignoring the ones who did

5.0(231 ratings)
intermediate
348 pages

Most cryptography books are written for cryptographers. This one is written for the engineer who has to ship JWT validation before lunch. You will learn the actual attack surface of every primitive you've already used: AES-GCM nonce reuse, RSA padding oracles, signed-cookie tampering, and the unsafe defaults in libraries you trust. Includes secure-by-default Go and Python snippets you can paste into a service today.

Kenji Voss
Author
Kenji Voss
Staff Security Engineer

Kenji has shipped audits for fintech and critical-infrastructure clients across three continents. His writing strips out the marketing layer most security books leave in.

$21.99
$26.99
Instant PDF + EPUB delivery
DRM-free, copy onto any device
Free chapter updates for the life of the edition
View cart
Specifications
Pages
348
Edition
1st Edition
Language
English
Level
intermediate
ISBN
978-1-99999-003-6
Published
November 2025
Editorial review

Reviewed by three working engineers at peer publications before publication. We do not publish first drafts.

Table of contents

What you'll find inside.

  1. 01Threat Models for the Tired
  2. 02Symmetric Encryption That Won't Bite You
  3. 03Asymmetric Crypto, Demystified
  4. 04Hashing, Signatures, and KDFs
  5. 05JWTs and What They Cannot Prove
  6. 06TLS for People Who Skip the RFC
  7. 07Storing Secrets at Rest
  8. 08The Cost of Post-Quantum
  9. 09Bug Bounties Worth Reading
Reader reviews

5.0 / 5

231 verified readers

Verified purchase

Finally, crypto explained for engineers

I have been writing JWT code for years and only after this book did I understand why I should have stopped. The threat model framing is excellent.

Aanya Krishnan · Senior Backend Engineer
Also in this section

More from Security & Cryptography