Vous en avez un à vendre ?

Cryptographie appliquée : protocoles, algorithmes et code source en C par Schneier, B

Once Upon a Time Books Inc
(335201)
Inscrit comme vendeur professionnel
5,73 USD
Environ4,94 EUR
État :
Bon état
This is a used book in good condition and may show some signs of use or wear .
Pas d'inquiétude ! Les retours sont acceptés.
Livraison :
Gratuit Economy Shipping.
Lieu où se trouve l'objet : Tontitown, Arkansas, États-Unis
Délai de livraison :
Estimé entre le jeu. 31 juil. et le lun. 4 août à 94104
Les délais de livraison sont estimés au moyen de notre méthode exclusive basée sur la distance entre l'acheteur et le lieu où se trouve l'objet, le service de livraison sélectionné, l'historique des livraisons du vendeur et d'autres facteurs. Les délais de livraison peuvent varier, notamment pendant les périodes de pointe.
Retours :
Retour sous 30 jours. L'acheteur paie les frais de retour. Si vous utilisez un bordereau d'affranchissement eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
     Diners Club

Achetez en toute confiance

Garantie client eBay
Obtenez un remboursement si vous ne recevez pas l'objet que vous avez commandé. En savoir plusGarantie client eBay - la page s'ouvre dans une nouvelle fenêtre ou un nouvel onglet
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :388650951970

Caractéristiques de l'objet

État
Bon état
Livre ayant déjà été lu, mais qui est toujours en bon état. La couverture présente des dommages mineurs, comme des éraflures, mais n'est ni trouée ni déchirée. Pour les couvertures rigides, la jaquette n'est pas nécessairement incluse. La reliure présente des marques d'usure mineures. La majorité des pages sont intactes. Pliures et déchirures mineures. Soulignement de texte mineur au crayon. Aucun surlignement de texte. Aucune note dans les marges. Aucune page manquante. Consulter l'annonce du vendeur pour avoir plus de détails et voir la description des défauts. Afficher toutes les définitions des étatsla page s'ouvre dans une nouvelle fenêtre ou un nouvel onglet
Commentaires du vendeur
“This is a used book in good condition and may show some signs of use or wear .”
Book Title
Applied Cryptography: Protocols, Algorithms, and Source Code in C
ISBN
9780471117094

À propos de ce produit

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471117099
ISBN-13
9780471117094
eBay Product ID (ePID)
718395

Product Key Features

Number of Pages
792 Pages
Publication Name
Applied Cryptography : Protocols, Algorithms, and Source Code in C
Language
English
Publication Year
1995
Subject
Communication Studies, Security / Cryptography, Security / General, Telecommunications
Type
Textbook
Subject Area
Computers, Technology & Engineering, Language Arts & Disciplines
Author
Bruce Schneier
Format
Trade Paperback

Dimensions

Item Height
1.6 in
Item Weight
40.8 Oz
Item Length
9.2 in
Item Width
7.2 in

Additional Product Features

Edition Number
2
Intended Audience
Trade
LCCN
95-012398
Reviews
"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)
Dewey Edition
20
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Partial table of contents: CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols. CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. CRYPTOGRAPHIC ALGORITHMS. Data Encryption Standard (DES). Other Block Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. Public-Key Algorithms. Special Algorithms for Protocols. THE REAL WORLD. Example Implementations. Politics. SOURCE CODE.source Code. References.
Synopsis
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations, ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations, ". . . the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . " -Wired Magazine ". . . monumental. . . fascinating. . . comprehensive. . . the definitive work on cryptography for computer programmers. . . " -Dr. Dobb's Journal ". . ., ." . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published.. . ." -Wired Magazine ." . .monumental . . . fascinating . . . comprehensive . . . thedefinitive work on cryptography for computer programmers . . ."-Dr. Dobb's Journal ." . .easily ranks as one of the most authoritative in its field."-PC Magazine ." . .the bible of code hackers." -The Millennium Whole EarthCatalog This new edition of the cryptography classic provides you with acomprehensive survey of modern cryptography. The book details howprogrammers and electronic communications professionals can usecryptography-the technique of enciphering and decipheringmessages-to maintain the privacy of computer data. It describesdozens of cryptography algorithms, gives practical advice on how toimplement them into cryptographic software, and shows how they canbe used to solve security problems. Covering the latestdevelopments in practical cryptographic techniques, this newedition shows programmers who design computer applications, networks, and storage systems how they can build security intotheir software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat thekey escrow mechanism * New encryption algorithms, including algorithms from the formerSoviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographicimplementations
LC Classification Number
QA76.9.A25S35 1996

Description de l'objet fournie par le vendeur

Informations sur le vendeur professionnel

Je certifie que toutes mes activités de vente seront conformes à toutes les lois et réglementations de l'UE.
À propos de ce vendeur

Once Upon a Time Books Inc

98,9% d'évaluations positives962 000 objets vendus

Membre depuis sept. 1998
Inscrit comme vendeur professionnel
We are a full-line, online bookseller. With our inventory of over 60,000 items, we aim to be your first stop on the internet for all of your used and out-of-print book buying needs. To help find the ...
Plus
Visiter la BoutiqueContacter

Évaluations détaillées du vendeur

Moyenne pour les 12 derniers mois
Description exacte
4.9
Frais de livraison raisonnables
5.0
Livraison rapide
5.0
Communication
5.0

Catégories populaires de cette Boutique

Évaluations du vendeur (467.881)

Toutes les évaluations
Positives
Neutres
Négatives