Applied Cryptography : Protocols, Algorithms and Source Code in C by Bruce Schneier (1995, Trade Paperback)

AlibrisBooks (463980)
98.6% positive feedback
Price:
$122.24
Free shipping
Estimated delivery Thu, Aug 28 - Wed, Sep 3
Returns:
30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Brand New
New Hard cover

About this product

Product Identifiers

PublisherWiley & Sons, Incorporated, John
ISBN-100471128457
ISBN-139780471128458
eBay Product ID (ePID)717842

Product Key Features

Number of Pages784 Pages
LanguageEnglish
Publication NameApplied Cryptography : Protocols, Algorithms and Source Code in C
Publication Year1995
SubjectCommunication Studies, Security / Cryptography, Security / General, Telecommunications
FeaturesRevised
TypeTextbook
Subject AreaComputers, Technology & Engineering, Language Arts & Disciplines
AuthorBruce Schneier
FormatTrade Paperback

Dimensions

Item Height1.7 in
Item Weight46.1 Oz
Item Length9.2 in
Item Width7.6 in

Additional Product Features

Edition Number2
Intended AudienceScholarly & Professional
LCCN95-012398
Dewey Edition23
IllustratedYes
Dewey Decimal005.82
Table Of ContentPartial table of contents:CRYPTOGRAPHIC PROTOCOLS.Protocol Building Blocks.Basic Protocols.Intermediate Protocols.Advanced Protocols.Esoteric Protocols.CRYPTOGRAPHIC TECHNIQUES.Key Length.Key Management.Algorithm Types and Modes.Using Algorithms.CRYPTOGRAPHIC ALGORITHMS.Data Encryption Standard (DES).Other Block Ciphers.Other Stream Ciphers and Real Random-Sequence Generators.Public-Key Algorithms.Special Algorithms for Protocols.THE REAL WORLD.Example Implementations.Politics.SOURCE CODE.source Code.References.
Edition DescriptionRevised edition
Synopsis". . .the best introduction to cryptography I2ve ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb2s Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What2s new in the Second Edition? New information on the Clipper Chip, including ways to defeat the key escrow mechanism New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher The latest protocols for digital signatures, authentication, secure elections, digital cash, and more More detailed information on key management and cryptographic implementations, ". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
LC Classification NumberQA76.9.A25S35 1996

All listings for this product

Buy It Now
Any Condition
New
Pre-owned
No ratings or reviews yet
Be the first to write a review