000 | 01228nam a22002297a 4500 | ||
---|---|---|---|
005 | 20240826123212.0 | ||
008 | 240826b |||||||| |||| 00| 0 eng d | ||
020 | _a9780471223573(PB) | ||
041 | _aeng | ||
082 |
_a005.82 _bFER |
||
100 | _aFerguson, Niels | ||
245 | _aPractical cryptography | ||
260 |
_aNew York _bWiley _c2023 |
||
300 | _axx, 410 p | ||
505 | _aOur design philosophy The context of cryptography Introduction to cryptography Block ciphers Block cipher modes Hash functions Message authentication codes The secure channel Implementation issues (I) Generating randomness Primes Diffie-Hellman RSA Introduction to cryptographic protocols Key negotiation protocol Implementation issues (II) The clock Key servers The dream of PKI PKI reality PKI practicalities Storing secrets Standards Patents Involving experts | ||
520 | _aSecurity is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. | ||
650 | _aCodering | ||
650 | _a Computer Security | ||
650 | _aCryptography | ||
700 | _aBruce Schneier | ||
942 |
_2ddc _cBK |
||
999 |
_c2364 _d2364 |