"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers ..." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine "...the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern ...
Read More
"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers ..." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine "...the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? New information on the Clipper Chip, including ways to defeat the key escrow mechanism New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher The latest protocols for digital signatures, authentication, secure elections, digital cash, and more More detailed information on key management and cryptographic implementations
Read Less
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $23.83, good condition, Sold by Zoom Books East rated 5.0 out of 5 stars, ships from Glendale Heights, IL, UNITED STATES, published 1995 by Wiley.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Book is in good condition and may include underlining highlighting and minimal wear. The book can also include From the library of labels. May not contain miscellaneous items toys dvds etc. We offer 100% money back guarantee and 24 7 customer service.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $24.82, very good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $24.82, very good condition, Sold by ThriftBooks-Reno rated 5.0 out of 5 stars, ships from Reno, NV, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $24.82, good condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $24.83, good condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 1995 by Wiley.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $28.82, good condition, Sold by Goodwill of Silicon Valley rated 5.0 out of 5 stars, ships from San Jose, CA, UNITED STATES, published 1995 by Wiley.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Good condition! Any other included accessories are also in Good condition showing use. Use can included some highlighting and writing page and cover creases as well as other types visible wear.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $66.28, good condition, Sold by TEXTSHUB rated 5.0 out of 5 stars, ships from Franklin Lakes, NJ, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $24.82, good condition, Sold by ThriftBooks-Baltimore rated 4.0 out of 5 stars, ships from Halethorpe, MD, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $58.70, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 1995 by Wiley.
Add this copy of Applied Cryptography: Protocols, Algorithms, and Source to cart. $166.94, new condition, Sold by GridFreed rated 4.0 out of 5 stars, ships from North Las Vegas, NV, UNITED STATES, published 1995 by Wiley.