From
ThriftBooks-Dallas, Dallas, TX, U.S.A.
Seller rating 5 out of 5 stars
AbeBooks Seller since July 2, 2009
Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.95. Seller Inventory # G0471117099I3N10
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
". . .the bible...
Review: Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.
Title: Applied Cryptography: Protocols, Algorithms,...
Publisher: Wiley
Publication Date: 1996
Binding: Paperback
Condition: Good
Dust Jacket Condition: No Jacket
Edition: 2nd Edition
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine. Seller Inventory # GOR002047015
Quantity: 1 available
Seller: New Legacy Books, Annandale, NJ, U.S.A.
Condition: Good. Fast shipping and order satisfaction guaranteed. A portion of your purchase benefits Non-Profit Organizations, First Aid and Fire Stations! Seller Inventory # 5FS000001099_ns
Quantity: 2 available
Seller: Goodwill Books, Hillsboro, OR, U.S.A.
Condition: Good. Signs of wear and consistent use. Seller Inventory # 3IISL80005GB_ns
Quantity: 1 available
Seller: Red's Corner LLC, Tucker, GA, U.S.A.
Condition: VeryGood. All orders ship by next business day! This is a used paperback book. Has wear on cover and/or pages. Book has no markings on pages. Front cover has crease(s). For USED books, we cannot guarantee supplemental materials such as CDs, DVDs, access codes and other materials. We are a small company and very thankful for your business! Seller Inventory # 4CNZEC0001J1
Quantity: 1 available
Seller: Seattle Goodwill, Seattle, WA, U.S.A.
Paperback. Condition: Good. May have some shelf-wear due to normal use. Seller Inventory # 0KVOG2000NCV
Quantity: 2 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. ".the best introduction to cryptography I've ever seen.The book the National Security Agency wanted never to be published." -Wired Magazine ".monumental .fascinating .comprehensive .the definitive work on cryptography for computer programmers ." -Dr. Dobb's Journal ".easily ranks as one of the most authoritative in its field." -PC Magazine ".the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? New information on the Clipper Chip, including ways to defeat the key escrow mechanism New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher The latest protocols for digital signatures, authentication, secure elections, digital cash, and more More detailed information on key management and cryptographic implementations. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR001521654
Quantity: 11 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: New. Seller Inventory # 00084823958
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Acceptable. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00076966210
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00086048997
Quantity: 3 available
Seller: ThriftBooks-Phoenix, Phoenix, AZ, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.95. Seller Inventory # G0471117099I3N00
Quantity: 4 available