![Applied Cryptography: Protocols, Algorithms and Source Code in C](https://d3525k1ryd2155.cloudfront.net/f/726/096/9781119096726.ME.0.l.jpg)
Applied Cryptography: Protocols, Algorithms and Source Code in C Hardcover - 2015
by Schneier, Bruce
- Used
- Good
- Hardcover
Description
Standard delivery: 4 to 14 days
Details
- Title Applied Cryptography: Protocols, Algorithms and Source Code in C
- Author Schneier, Bruce
- Binding Hardcover
- Edition 20th Anniversary
- Condition Used - Good
- Pages 784
- Volumes 1
- Language ENG
- Publisher Wiley
- Date 2015-03-30
- Illustrated Yes
- Features Bibliography, Illustrated, Index
- Bookseller's Inventory # SKU0483515
- ISBN 9781119096726 / 1119096723
- Weight 3.1 lbs (1.41 kg)
- Dimensions 9.7 x 7.5 x 1.6 in (24.64 x 19.05 x 4.06 cm)
- Library of Congress subjects Computer security, Cryptography
- Library of Congress Catalog Number 2015932956
- Dewey Decimal Code 005.8
About SGS Trading Inc New Jersey, United States
Textbook and Reference Books Discounted
From the rear cover
Praise for Applied Cryptography
"This book should be on the shelf of any computer professional involved in the use or implementation of cryptography."
-- IEEE Software
"An encyclopedic survey ... could well have been subtitled 'The Joy of Encrypting' ... a useful addition to the library of any active or would-be security practitioner."
-- Cryptologia
"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..."
-- Wired magazine
"...easily ranks as one of the most authoritative in its field..."
-- PC magazine
"...monumental...fascinating...comprehensive...the definitive work on cryptography for computer programmers..."
-- Dr. Dobb's journal
Written by the world's most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.
Included in this edition:
- Exclusive forward by Bruce Schneier
- Ways to defeat the key escrow mechanism
- Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
- Protocols for digital signatures, authentication, secure elections, digital cash, and more
- Detailed information on key management and cryptographic implementations