This auction has been won.
Leading
Jdlg345 1 × R250.00
13 Oct 12:44

Applied Cryptography - Protocols, Algorithms, and Source Code in C - 2nd Edition

1 was available / secondhand
R250.00 auction closed
Closed 15 Oct 08 15:30
Shipping
Standard courier shipping from R30
R30 Standard shipping using one of our trusted couriers applies to most areas in South Africa. Some areas may attract a R30 surcharge. This will be calculated at checkout if applicable.
Check my rate
Ready to ship in
The seller has indicated that they will usually have this item ready to ship within 3 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Buyer Protection

Product details

Condition
Secondhand
Location
South Africa
Customer ratings:
Product code
Computer; Security; Crypto; Systems; Programming
Bob Shop ID
9449276

The book the National Security Agency

wanted never to be published.

"There are two types of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter."

This is a deep and totally comprehensive book. This is a must have book for anyone designing, analysing, or hacking security protocols.

784 Pages

Author: Bruce Schneier

Publisher: Wiley

 

Chapter Summary:

  • Foundations

Part 1 - Crytographic Protocols

  • Protocol Building Blocks
  • Basic Protocols
  • Intermediate Protocols
  • Advanced Protocols
  • Esoteric Protocols

Part 2 - Cryptographic Techniques

  • Key Length
  • Key Management
  • Algorithm Types and Modes
  • Using Algorithms

Part 3 - Cryptographic Algorithms

  • Mathematical Background
  • Data Encryption Standard (DES)
  • Other Block Ciphers
  • Still Other Block Ciphers
  • Combining Block Ciphers
  • Pseudo-Random-Sequence Generators and Stream Ciphers
  • Other Stream Ciphers and Real Random-Sequence Generators
  • One-Way Hash Functions
  • Public-Key Algorithms
  • Public-Key Digital Signature Algorithms
  • Identification Schemes
  • Key-Exchange Algorithms
  • Special Algorithms for Protocols

Part 4 - The Real World

  • Example Implementations
  • Politics

Part 5 - Source Code

 

Customer ratings: 1 ratings

Excellent seller! Thanks!
17 Oct 2008