Foto 1 di 1

Galleria
Foto 1 di 1

Ne hai uno da vendere?
Applied Cryptography: Protocols, Algorithms, and Source Code in C by Schneier, B
US $5,73
CircaEUR 4,88
Condizione:
“This is a used book in good condition and may show some signs of use or wear .”
Buone condizioni
Libro che è già stato letto ma è in buone condizioni. Mostra piccolissimi danni alla copertina incluse alcune rigature, ma nessun foro o strappo. È possibile che la sovraccoperta per le copertine rigide non sia inclusa. La rilegatura presenta minimi segni di usura. La maggior parte delle pagine non è danneggiata e mostra una quantità minima di piegature o strappi, sottolineature di testo a matita, nessuna evidenziazione di testo né scritte ai margini. Non ci sono pagine mancanti. Per maggiori dettagli e la descrizione di eventuali imperfezioni, consulta l'inserzione del venditore.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis Economy Shipping.
Oggetto che si trova a: Tontitown, Arkansas, Stati Uniti
Consegna:
Consegna prevista tra il gio 31 lug e il lun 4 ago a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:388650951970
Specifiche dell'oggetto
- Condizione
- Buone condizioni
- Note del venditore
- “This is a used book in good condition and may show some signs of use or wear .”
- Book Title
- Applied Cryptography: Protocols, Algorithms, and Source Code in C
- ISBN
- 9780471117094
Informazioni su questo prodotto
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471117099
ISBN-13
9780471117094
eBay Product ID (ePID)
718395
Product Key Features
Number of Pages
792 Pages
Publication Name
Applied Cryptography : Protocols, Algorithms, and Source Code in C
Language
English
Publication Year
1995
Subject
Communication Studies, Security / Cryptography, Security / General, Telecommunications
Type
Textbook
Subject Area
Computers, Technology & Engineering, Language Arts & Disciplines
Format
Trade Paperback
Dimensions
Item Height
1.6 in
Item Weight
40.8 Oz
Item Length
9.2 in
Item Width
7.2 in
Additional Product Features
Edition Number
2
Intended Audience
Trade
LCCN
95-012398
Reviews
"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)
Dewey Edition
20
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Partial table of contents: CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols. CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. CRYPTOGRAPHIC ALGORITHMS. Data Encryption Standard (DES). Other Block Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. Public-Key Algorithms. Special Algorithms for Protocols. THE REAL WORLD. Example Implementations. Politics. SOURCE CODE.source Code. References.
Synopsis
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations, ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations, ". . . the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . " -Wired Magazine ". . . monumental. . . fascinating. . . comprehensive. . . the definitive work on cryptography for computer programmers. . . " -Dr. Dobb's Journal ". . ., ." . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published.. . ." -Wired Magazine ." . .monumental . . . fascinating . . . comprehensive . . . thedefinitive work on cryptography for computer programmers . . ."-Dr. Dobb's Journal ." . .easily ranks as one of the most authoritative in its field."-PC Magazine ." . .the bible of code hackers." -The Millennium Whole EarthCatalog This new edition of the cryptography classic provides you with acomprehensive survey of modern cryptography. The book details howprogrammers and electronic communications professionals can usecryptography-the technique of enciphering and decipheringmessages-to maintain the privacy of computer data. It describesdozens of cryptography algorithms, gives practical advice on how toimplement them into cryptographic software, and shows how they canbe used to solve security problems. Covering the latestdevelopments in practical cryptographic techniques, this newedition shows programmers who design computer applications, networks, and storage systems how they can build security intotheir software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat thekey escrow mechanism * New encryption algorithms, including algorithms from the formerSoviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographicimplementations
LC Classification Number
QA76.9.A25S35 1996
Descrizione dell'oggetto fatta dal venditore
Informazioni sul venditore professionale
Informazioni su questo venditore
Once Upon a Time Books Inc
98,9% di Feedback positivi•961 mila oggetti venduti
Registrato come venditore professionale
Categorie più popolari di questo Negozio
Feedback sul venditore (467.783)
- c***m (417)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoWOW!; I cannot believe this 4 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 04/19, Sat, Received 04/25 Fri to Hawaii using free shipping; USPS Ground Mail, Paperback Book in Good Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!Dave Barry Slept Here: A Sort of History of the United States by Barry, Dave, Go (N° 405188191404)
- r***r (7468)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoOnce Upon a Time Books Inc is an eBay seller newer to me. I was very pleased with this transaction. The books were packaged securely, shipped promptly and are just as described. They have a large inventory and their prices are reasonable. They also reduce orders of three books by twenty five percent. I will be back to shop more at Once Upon a Time Books Inc. Thank you.Crewel Yule (A Needlecraft Mystery) by Ferris, Monica, Acceptable Book (N° 316578732673)
- g***g (298)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoSent seller message that I needed the item before end of expected delivery date quoted. Not only did they make sure I received the item by the date requested, it was packaged with extreme care. Item was as described, and in great condition. I highly recommend this high-quality seller! 😃👍🏻The Letters of Abelard and Heloise (Penguin Classics) by Betty Radice,Abelard, P (N° 405365821896)