\(
\def\WIPO{World Intellectual Property Organisation}
\)
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
2015
D 73 SCH.A
Disponible à WIPO Library
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DataCite | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Articles
Détails
Titre
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Auteur
Mention d'édition
Second edition.
Description
xxv, 758 pages : illustrations ; 24 cm.
ISBN
9780471128458 cloth
9780471117094 paper
9780470226261
9781119096726 hbk
9780471117094 paper
9780470226261
9781119096726 hbk
Autre cote
D 73 SCH.A
Résumé
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
Note
Cette édition spéciale anniversaire fête ses 20 ans.
Bibliographie, remarque
Includes bibliographical references (pages 675-741) and index.
Série
Série
Schneier's cryptography classics library / Bruce Schneier ; A.
Publié
Indianapolis, IN : Wiley, [2015]
Langue
Anglais
Le document apparaît dans
Sujet
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.