000 03295cam a2200469 i 4500
999 _c200436359
_d54571
001 200436359
003 TR-AnTOB
005 20200109121757.0
007 ta
008 950327t19961996nyua b 001 0 eng
010 _a95012398
015 _aGB96-3062
020 _a0471128457 (cloth : acidfree paper)
020 _a0471117099 (paper : acidfree paper)
020 _a9780471117094 (paper : acidfree paper)
035 _a32311687
035 _a(TR-AnTOB)200436359
040 _aDLC
_beng
_erda
_cDLC
_dUKM
_dUtOrBLW
_dTR-AnTOB
041 0 _aeng
050 0 0 _aQA76.9.A25
_bS35 1996
090 _aQA76.9.A25
_bS35 1996
100 1 _aSchneier, Bruce,
_d1963-
_eauthor
_0http://id.loc.gov/authorities/names/n93043083.
_92794
245 1 0 _aApplied cryptography :
_bprotocols, algorithms, and source code in C /
_cBruce Schneier.
250 _aSecond edition.
264 1 _aNew York :
_bWiley,
_c[1996].
264 4 _c ©1996
300 _axxiii, 758 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent.
337 _aunmediated
_bn
_2rdamedia.
338 _avolume
_bnc
_2rdacarrier.
504 _aIncludes bibliographical references (pages 675-741) and index.
505 _tForeword /
_rWhitfield Diffie -
_g1.
_tFoundations --
_g2.
_tProtocol Building Blocks --
_g3.
_tBasic Protocols --
_g4.
_tIntermediate Protocols --
_g5.
_tAdvanced Protocols --
_g6.
_tEsoteric Protocols --
_g7.
_tKey Length --
_g8.
_tKey Management --
_g9.
_tAlgorithm Types and Modes --
_g10.
_tUsing Algorithms --
_g11.
_tMathematical Background --
_g12.
_tData Encryption Standard (DES) --
_g13.
_tOther Block Ciphers --
_g14.
_tStill Other Block Ciphers --
_g15.
_tCombining Block Ciphers --
_g16.
_tPseudo-Random-Sequence Generators and Stream Ciphers --
_g17.
_tOther Stream Ciphers and Real Random-Sequence Generators --
_g18.
_tOne-Way Hash Functions --
_g19.
_tPublic-Key Algorithms --
_g20.
_tPublic-Key Digital Signature Algorithms --
_g21.
_tIdentification Schemes --
_g22.
_tKey-Exchange Algorithms --
_g23.
_tSpecial Algorithms for Protocols --
_g24.
_tExample Implementations --
_g25.
_tPolitics --
_tAfterword /
_rMatt Blaze.
520 _aThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
590 _aDonated by Kemal Bıçakcı
650 0 _aComputer security
_0http://id.loc.gov/authorities/subjects/sh90001862.
_9912
650 0 _aCryptography
_0http://id.loc.gov/authorities/subjects/sh85034453.
_9428
650 0 _aTelecommunication
_xSecurity measures
_0http://id.loc.gov/authorities/subjects/sh85133285.
_9125697
653 0 _aCryptology.
942 _2lcc
_cBK