"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers ..." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine "...the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern ...
Read More
"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers ..." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine "...the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? New information on the Clipper Chip, including ways to defeat the key escrow mechanism New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher The latest protocols for digital signatures, authentication, secure elections, digital cash, and more More detailed information on key management and cryptographic implementations
Read Less
Add this copy of Applied Cryptography: Protocols, Algorithms and Source to cart. $8.89, very good condition, Sold by Greener Books rated 4.0 out of 5 stars, ships from London, UNITED KINGDOM, published 1995 by John Wiley & Sons.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. **SHIPPED FROM UK** We believe you will be completely satisfied with our quick and reliable service. All orders are dispatched as swiftly as possible! Buy with confidence! Greener Books.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.77, very good condition, Sold by ThriftBooks-Reno rated 5.0 out of 5 stars, ships from Reno, NV, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.77, good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.77, good condition, Sold by ThriftBooks-Reno rated 5.0 out of 5 stars, ships from Reno, NV, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.77, good condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.77, fair condition, Sold by ThriftBooks-Reno rated 5.0 out of 5 stars, ships from Reno, NV, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.77, fair condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $9.79, good condition, Sold by Seattle Goodwill rated 5.0 out of 5 stars, ships from Seattle, WA, UNITED STATES, published 1995 by Wiley.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwill's nonprofit mission!
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $11.39, good condition, Sold by Goodwill Books rated 5.0 out of 5 stars, ships from Hillsboro, OR, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $13.35, very good condition, Sold by Wonder Book - Member ABAA/ILAB rated 5.0 out of 5 stars, ships from Frederick, MD, UNITED STATES, published 1995 by Wiley.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very Good. Very Good condition. 2nd edition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. NOT AVAILABLE FOR SHIPMENT OUTSIDE OF THE UNITED STATES.