\(
\def\WIPO{World Intellectual Property Organisation}
\)
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
2015
D 73 SCH.A
Available at WIPO Library
شكل
| تنسيق | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DataCite | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Items
تفاصيل
Title
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Author
الطبعة
Second edition.
الوصف
xxv, 758 pages : illustrations ; 24 cm.
الرقم الدولي المعياري للكتاب
9780471128458 cloth
9780471117094 paper
9780470226261
9781119096726 hbk
9780471117094 paper
9780470226261
9781119096726 hbk
Alternate Call Number
D 73 SCH.A
ملخص
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
ملاحظة
Cette édition spéciale anniversaire fête ses 20 ans.
ملاحظة الفهرس, إلخ
Includes bibliographical references (pages 675-741) and index.
السلسلة
السلسلة
Schneier's cryptography classics library / Bruce Schneier ; A.
Published
Indianapolis, IN : Wiley, [2015]
اللغة(لغات)
eng
السجل يظهر فى
Subject
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.