\(
\def\WIPO{World Intellectual Property Organisation}
\)
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
2015
D 73 SCH.A
Available at WIPO Library
Форматы
| Формат | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DataCite | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Items
Полное описание
Title
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Author
Издание
Second edition.
Описание
xxv, 758 pages : illustrations ; 24 cm.
ISBN
9780471128458 cloth
9780471117094 paper
9780470226261
9781119096726 hbk
9780471117094 paper
9780470226261
9781119096726 hbk
Alternate Call Number
D 73 SCH.A
Резюме
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
Примечание
Cette édition spéciale anniversaire fête ses 20 ans.
Библиографическая и др. запись
Includes bibliographical references (pages 675-741) and index.
Серия
Серии
Schneier's cryptography classics library / Bruce Schneier ; A.
Published
Indianapolis, IN : Wiley, [2015]
Язык(и)
eng
Запись имеется в
Subject
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.