\(
\def\WIPO{World Intellectual Property Organisation}
\)
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
2015
D 73 SCH.A
Available at WIPO Library
Items
Details
Title
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Author
Edition
Second edition.
Description
xxv, 758 pages : illustrations ; 24 cm.
ISBN
9780471128458 cloth
9780471117094 paper
9780470226261
9781119096726 hbk
9780471117094 paper
9780470226261
9781119096726 hbk
Alternate Call Number
D 73 SCH.A
Summary
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
Note
Cette édition spéciale anniversaire fête ses 20 ans.
Bibliography, etc. Note
Includes bibliographical references (pages 675-741) and index.
Series
Series
Schneier's cryptography classics library / Bruce Schneier ; A.
Published
Indianapolis, IN : Wiley, [2015]
Language
English
Record Appears in
Subject
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.