Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Buy Now
Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition (Hardcover, 20th Anniversary Edition)
Loot Price: R1,364
Discovery Miles 13 640
You Save: R332
(20%)
|
|
Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition (Hardcover, 20th Anniversary Edition)
Expected to ship within 12 - 19 working days
|
From the world's most renowned security technologist, Bruce
Schneier, this 20th Anniversary Edition is the most definitive
reference on cryptography ever published and is the seminal work on
cryptography. Cryptographic techniques have applications far beyond
the obvious uses of encoding and decoding information. For
developers who need to know about capabilities, such as digital
signatures, that depend on cryptographic techniques, there's no
better overview than Applied Cryptography, the definitive book on
the subject. Bruce Schneier covers general classes of cryptographic
protocols and then specific techniques, detailing the inner
workings of real-world cryptographic algorithms including the Data
Encryption Standard and RSA public-key cryptosystems. The book
includes source-code listings and extensive advice on the practical
aspects of cryptography implementation, such as the importance of
generating truly random numbers and of keeping keys secure. "...the
best introduction to cryptography I've ever seen...The book the
National Security Agency wanted never to be published..." -Wired
Magazine "...monumental ...fascinating ...comprehensive ...the
definitive work on cryptography for computer programmers . .." -Dr.
Dobb's Journal "...easily ranks as one of the most authoritative in
its field." -PC Magazine The book details how programmers and
electronic communications professionals can use cryptography-the
technique of enciphering and deciphering messages-to maintain the
privacy of computer data. It describes dozens of cryptography
algorithms, gives practical advice on how to implement them into
cryptographic software, and shows how they can be used to solve
security problems. The book shows programmers who design computer
applications, networks, and storage systems how they can build
security into their software and systems. With a new Introduction
by the author, this premium edition will be a keepsake for all
those committed to computer and cyber security.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.