• Practical Cryptography See large image

    Practical Cryptography (Paperback) By (author) Niels Ferguson, By (author) Bruce Schneier

    $32.60 - Save $23.83 42% off - RRP $56.43 Free delivery worldwide Available
    Dispatched in 3 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionSecurity is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for Practical Cryptography

    Title
    Practical Cryptography
    Authors and contributors
    By (author) Niels Ferguson, By (author) Bruce Schneier
    Physical properties
    Format: Paperback
    Number of pages: 432
    Width: 189 mm
    Height: 236 mm
    Thickness: 23 mm
    Weight: 652 g
    Language
    English
    ISBN
    ISBN 13: 9780471223573
    ISBN 10: 0471223573
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20
    B&T Modifier: Academic Level: 03
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    BIC subject category V2: URD
    LC subject heading:
    BISAC V2.8: COM060000
    BIC subject category V2: URY
    Warengruppen-Systematik des deutschen Buchhandels: 16360
    BISAC V2.8: COM053000, COM043000
    LC subject heading:
    DC22: 005.82, 005.8/2
    LC subject heading:
    B&T Approval Code: A93663051
    LC classification: QA76.825
    LC subject heading:
    LC classification: QA76.9.A25 F466 2003
    Thema V1.0: UBW, URD, URY
    Publisher
    John Wiley and Sons Ltd
    Imprint name
    John Wiley & Sons Inc
    Publication date
    15 April 2003
    Publication City/Country
    New York
    Author Information
    NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large-scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers. BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed-security monitoring company. A world-renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).
    Table of contents
    Preface. 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation. Issues (I). II Key Negotiation. 10. Generating Randomness. 11. Primes. 12. Diffie-Hellman. 13. RSA. 14. Introduction to Cryptographic Protocols. 15. Negotiation Protocol. 16. Implementation Issues. III Key Management. 17. The Clock. 18. Key Servers. 19. The Dream of PKI. 20. PKI Reality. 21. PKI Practicalities. 22. Storing Secrets. IV Miscellaneous. 23. Standards. 24. Patents. 25. Involving Experts. Acknowledgments. Bibliography. Index.