Imagen 1 de 2


Galería
Imagen 1 de 2


¿Quieres vender uno?
Applied Cryptography: Protocols, Algorithms, and Source Code in C
USD5,14
Aproximadamente4,39 EUR
Estado:
Aceptable
Libro con un desgaste evidente. La tapa puede tener algunos desperfectos, pero el libro está entero. La encuadernación puede estar ligeramente deteriorada, pero mantiene su integridad. Es posible que tenga anotaciones en los márgenes, texto subrayado o resaltado, pero conserva todas las páginas y no tiene ningún desperfecto que dificulte su lectura o comprensión. Consulta el anuncio del vendedor para obtener más información y la descripción de cualquier posible imperfección.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Envío:
Gratis Economy Shipping.
Ubicado en: Denver, Colorado, Estados Unidos
Entrega:
Entrega prevista entre el mié. 20 ago. y el lun. 25 ago. a 94104
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
Compra con confianza
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:357252928014
Última actualización el 15 ago 2025 22:58:30 H.EspVer todas las actualizacionesVer todas las actualizaciones
Características del artículo
- Estado
- Release Year
- 1996
- Book Title
- Applied Cryptography: Protocols, Algorithms, and Source Code i...
- ISBN
- 9780471117094
Acerca de este producto
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471117099
ISBN-13
9780471117094
eBay Product ID (ePID)
718395
Product Key Features
Number of Pages
792 Pages
Publication Name
Applied Cryptography : Protocols, Algorithms, and Source Code in C
Language
English
Publication Year
1995
Subject
Communication Studies, Security / Cryptography, Security / General, Telecommunications
Type
Textbook
Subject Area
Computers, Technology & Engineering, Language Arts & Disciplines
Format
Trade Paperback
Dimensions
Item Height
1.6 in
Item Weight
40.8 Oz
Item Length
9.2 in
Item Width
7.2 in
Additional Product Features
Edition Number
2
Intended Audience
Trade
LCCN
95-012398
Reviews
"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)
Dewey Edition
20
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Partial table of contents: CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols. CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. CRYPTOGRAPHIC ALGORITHMS. Data Encryption Standard (DES). Other Block Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. Public-Key Algorithms. Special Algorithms for Protocols. THE REAL WORLD. Example Implementations. Politics. SOURCE CODE.source Code. References.
Synopsis
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations, ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations, ". . . the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . " -Wired Magazine ". . . monumental. . . fascinating. . . comprehensive. . . the definitive work on cryptography for computer programmers. . . " -Dr. Dobb's Journal ". . ., ." . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published.. . ." -Wired Magazine ." . .monumental . . . fascinating . . . comprehensive . . . thedefinitive work on cryptography for computer programmers . . ."-Dr. Dobb's Journal ." . .easily ranks as one of the most authoritative in its field."-PC Magazine ." . .the bible of code hackers." -The Millennium Whole EarthCatalog This new edition of the cryptography classic provides you with acomprehensive survey of modern cryptography. The book details howprogrammers and electronic communications professionals can usecryptography-the technique of enciphering and decipheringmessages-to maintain the privacy of computer data. It describesdozens of cryptography algorithms, gives practical advice on how toimplement them into cryptographic software, and shows how they canbe used to solve security problems. Covering the latestdevelopments in practical cryptographic techniques, this newedition shows programmers who design computer applications, networks, and storage systems how they can build security intotheir software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat thekey escrow mechanism * New encryption algorithms, including algorithms from the formerSoviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographicimplementations
LC Classification Number
QA76.9.A25S35 1996
Descripción del artículo del vendedor
Información de vendedor profesional
Acerca de este vendedor
Dream Books Co.
98,9% de votos positivos•1,8 millones artículos vendidos
Registrado como vendedor profesional
Votos de vendedor (486.450)
- a***m (698)- Votos emitidos por el comprador.Mes pasadoCompra verificadaItem came on time and as described, have already done business with seller as this was a replacement for a refunded defective copy of the same set of DVDs. This copy worked great. The seller refunded my defective copy without hesitation and gladly allowed me to buy again. I will buy from this seller if they have any other DVDs I ever need. This is the kind of seller you want to buy from. They communicate well too.* The DVD set was a fantastic price too, thanks again.!
- c***p (775)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaThis is part of a multiple shipment. There was a question about one item in the package, which was resolved, so the package arrived later than expected. However, it was well packed and arrived in great shape. The movies contained were exactly what I ordered, and all as described or better. I give 5 stars all round, including for shipping time, because of the reason behind it. It all leads to great service. Communication is excellent; variety, price & quality also. I highly recommend this seller.Mimic (#186849034253)
- 2***4 (149)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaDREAM BOOKS CO. HAS NY FAR BECOME MY #1 PLACE TO GO TO FOR DVDS AND BLU RAYS. Why, they have become a trustworthy seller to me over many buy's. This time I got COLUMBO the complete fifth season on DVD. As always they shipped fast, well wrapped up for the journey, arrived early and in perfect condition. Also for the best price and showed up Just as listed. Very good series. Great seller.