\(
\def\WIPO{World Intellectual Property Organisation}
\)
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
2015
D 73 SCH.A
Available at WIPO Library
格式
| 格式 | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DataCite | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Items
详细记录
Title
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Author
版本
Second edition.
描述
xxv, 758 pages : illustrations ; 24 cm.
国际图书编号
9780471128458 cloth
9780471117094 paper
9780470226261
9781119096726 hbk
9780471117094 paper
9780470226261
9781119096726 hbk
Alternate Call Number
D 73 SCH.A
摘要
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
附注
Cette édition spéciale anniversaire fête ses 20 ans.
书目等附注
Includes bibliographical references (pages 675-741) and index.
系列
丛编
Schneier's cryptography classics library / Bruce Schneier ; A.
Published
Indianapolis, IN : Wiley, [2015]
语言
eng
记录出处
Subject
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.