Bültmann & Gerriets
Applied Cryptography
Protocols, Algorithms and Source Code in C
von Bruce Schneier
Verlag: John Wiley & Sons Inc
Gebundene Ausgabe
ISBN: 978-1-119-09672-6
Erschienen am 15.05.2015
Sprache: Englisch
Format: 244 mm [H] x 192 mm [B] x 48 mm [T]
Gewicht: 1449 Gramm
Umfang: 784 Seiten

Preis: 75,00 €
keine Versandkosten (Inland)


Jetzt bestellen und voraussichtlich ab dem 29. Oktober in der Buchhandlung abholen.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

75,00 €
merken
zum E-Book (EPUB) 47,99 €
klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Klappentext
Biografische Anmerkung

Praise for Applied Cryptography

"This book should be on the shelf of any computer professional involved in the use or implementation of cryptography."
-- IEEE Software

"An encyclopedic survey ... could well have been subtitled 'The Joy of Encrypting' ... a useful addition to the library of any active or would-be security practitioner."
-- Cryptologia

"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..."
-- Wired magazine

"...easily ranks as one of the most authoritative in its field..."
-- PC magazine

"...monumental...fascinating...comprehensive...the definitive work on cryptography for computer programmers..."
-- Dr. Dobb's journal

Written by the world's most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.

Included in this edition:

  • Exclusive forward by Bruce Schneier
  • Ways to defeat the key escrow mechanism
  • Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
  • Protocols for digital signatures, authentication, secure elections, digital cash, and more
  • Detailed information on key management and cryptographic implementations



Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of twelve books--including his seminal work, Applied Cryptography: Protocols, Algorithms, and Source Code in C, and Secrets & Lies: Digital Security in a Networked World as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc. You can read his blog, essays, andacademic papers at www.schneier.com. He tweets at @schneierblog.


andere Formate