0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Not currently available

Applied Cryptography - Protocols, Algorithms and Source Code 2e (Paperback, 2nd ed) Loot Price: R1,058
Discovery Miles 10 580
You Save: R427 (29%)

Applied Cryptography - Protocols, Algorithms and Source Code 2e (Paperback, 2nd ed)

B. Schneier

 (1 rating, sign in to rate)
List price R1,485 Loot Price R1,058 Discovery Miles 10 580 | Repayment Terms: R99 pm x 12* You Save R427 (29%)

Bookmark and Share

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

General

Imprint: John Wiley & Sons
Country of origin: United States
Release date: November 1995
First published: November 1995
Authors: B. Schneier
Dimensions: 233 x 191 x 38mm (L x W x T)
Format: Paperback
Pages: 758
Edition: 2nd ed
ISBN-13: 978-0-471-11709-4
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 0-471-11709-9
Barcode: 9780471117094

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners