|Eingestellt in Kategorie:

Angewandte Kryptographie: Protokolle, Algorithmen und Quellcode in C von Schneier, B-

Ursprünglicher Text
Applied Cryptography: Protocols, Algorithms, and Source Code in C by Schneier, B
Once Upon a Time Books Inc
(335124)
Angemeldet als gewerblicher Verkäufer
US $5,73
Ca.EUR 4,88
Artikelzustand:
Gut
This is a used book in good condition and may show some signs of use or wear .
Ganz entspannt. Rückgaben akzeptiert.
Versand:
Kostenlos Economy Shipping.
Standort: Tontitown, Arkansas, USA
Lieferung:
Lieferung zwischen Do, 31. Jul und Mo, 4. Aug nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:388650951970

Artikelmerkmale

Artikelzustand
Gut
Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr geringfügige Beschädigungen auf, wie z.B. kleinere Schrammen, er hat aber weder Löcher, noch ist er eingerissen. Bei gebundenen Büchern ist der Schutzumschlag möglicherweise nicht mehr vorhanden. Die Bindung weist geringfügige Gebrauchsspuren auf. Die Mehrzahl der Seiten ist unbeschädigt, das heißt, es gibt kaum Knitter oder Einrisse, es wurden nur in geringem Maße Bleistiftunterstreichungen im Text vorgenommen, es gibt keine Textmarkierungen und die Randbereiche sind nicht beschrieben. Alle Seiten sind vollständig vorhanden. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers. Alle Zustandsdefinitionen aufrufenwird in neuem Fenster oder Tab geöffnet
Hinweise des Verkäufers
“This is a used book in good condition and may show some signs of use or wear .”
Book Title
Applied Cryptography: Protocols, Algorithms, and Source Code in C
ISBN
9780471117094

Über dieses Produkt

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471117099
ISBN-13
9780471117094
eBay Product ID (ePID)
718395

Product Key Features

Number of Pages
792 Pages
Publication Name
Applied Cryptography : Protocols, Algorithms, and Source Code in C
Language
English
Publication Year
1995
Subject
Communication Studies, Security / Cryptography, Security / General, Telecommunications
Type
Textbook
Subject Area
Computers, Technology & Engineering, Language Arts & Disciplines
Author
Bruce Schneier
Format
Trade Paperback

Dimensions

Item Height
1.6 in
Item Weight
40.8 Oz
Item Length
9.2 in
Item Width
7.2 in

Additional Product Features

Edition Number
2
Intended Audience
Trade
LCCN
95-012398
Reviews
"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)
Dewey Edition
20
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Partial table of contents: CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols. CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. CRYPTOGRAPHIC ALGORITHMS. Data Encryption Standard (DES). Other Block Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. Public-Key Algorithms. Special Algorithms for Protocols. THE REAL WORLD. Example Implementations. Politics. SOURCE CODE.source Code. References.
Synopsis
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations, ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations, ". . . the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . " -Wired Magazine ". . . monumental. . . fascinating. . . comprehensive. . . the definitive work on cryptography for computer programmers. . . " -Dr. Dobb's Journal ". . ., ." . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published.. . ." -Wired Magazine ." . .monumental . . . fascinating . . . comprehensive . . . thedefinitive work on cryptography for computer programmers . . ."-Dr. Dobb's Journal ." . .easily ranks as one of the most authoritative in its field."-PC Magazine ." . .the bible of code hackers." -The Millennium Whole EarthCatalog This new edition of the cryptography classic provides you with acomprehensive survey of modern cryptography. The book details howprogrammers and electronic communications professionals can usecryptography-the technique of enciphering and decipheringmessages-to maintain the privacy of computer data. It describesdozens of cryptography algorithms, gives practical advice on how toimplement them into cryptographic software, and shows how they canbe used to solve security problems. Covering the latestdevelopments in practical cryptographic techniques, this newedition shows programmers who design computer applications, networks, and storage systems how they can build security intotheir software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat thekey escrow mechanism * New encryption algorithms, including algorithms from the formerSoviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographicimplementations
LC Classification Number
QA76.9.A25S35 1996

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

Once Upon a Time Books Inc

98,9% positive Bewertungen961.349 Artikel verkauft

Mitglied seit Sep 1998
Angemeldet als gewerblicher Verkäufer
We are a full-line, online bookseller. With our inventory of over 60,000 items, we aim to be your first stop on the internet for all of your used and out-of-print book buying needs. To help find the ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Beliebte Kategorien in diesem Shop

Verkäuferbewertungen (467.783)

Alle Bewertungen
Positiv
Neutral
Negativ
  • c***m (417)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    WOW!; I cannot believe this 4 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 04/19, Sat, Received 04/25 Fri to Hawaii using free shipping; USPS Ground Mail, Paperback Book in Good Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
  • r***r (7468)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Once Upon a Time Books Inc is an eBay seller newer to me. I was very pleased with this transaction. The books were packaged securely, shipped promptly and are just as described. They have a large inventory and their prices are reasonable. They also reduce orders of three books by twenty five percent. I will be back to shop more at Once Upon a Time Books Inc. Thank you.
  • g***g (298)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Sent seller message that I needed the item before end of expected delivery date quoted. Not only did they make sure I received the item by the date requested, it was packaged with extreme care. Item was as described, and in great condition. I highly recommend this high-quality seller! 😃👍🏻

Produktbewertungen & Rezensionen

4.8
4 Produktbewertungen
  • 3 Nutzer bewerten dieses Produkt mit 5 von 5 Sternen
  • 1 Nutzer bewerten dieses Produkt mit 4 von 5 Sternen
  • 0 Nutzer bewerten dieses Produkt mit 3 von 5 Sternen
  • 0 Nutzer bewerten dieses Produkt mit 2 von 5 Sternen
  • 0 Nutzer bewerten dieses Produkt mit 1 von 5 Sternen

Would recommend

Good value

Compelling content

Relevanteste Rezensionen

  • Old, but still relevant.

    This book is directed at people who implement crypto. It's more for engineers than for academics. Most of us should know better than to make our own implementations of crypto algorithms. Today, it makes more sense to use tried-and-true libraries than to reinvent the wheel. I wouldn't use the book for its original purpose, but I still find it quite relevant to understand the basic concepts (and some history). It is highly dated. In 1996, the world was different. DES was still quite used, and the Clipper Chip was a current threat. Nobody talked about AES/Rijndael, and MD5 was already suspected to be insecure, though not yet as blatantly as today. This is not a good reference on how to do crypto in 2017. This is a good reference on what crypto is, what the basic concepts are about, and how ...

    Bestätigter Kauf: JaZustand: GebrauchtVerkauft von: betterworldbooks

  • thanks

    thanks

    Bestätigter Kauf: JaZustand: GebrauchtVerkauft von: thrift.books