Applied cryptography protocols, algorithms, and source code in C
| Main Author: | Schneier, Bruce 1963- (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis
John Wiley & Sons
c2015
|
| Edition: | 20th ed |
| Subjects: |
Similar Items
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Computer and cyber security principles, algorithm, applications, and perspectives
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2007)
by: Dhillon, Gurpreet 1963-
Published: (2007)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Visual cryptography and secret image sharing
by: Ching-Nung, Yang, et al.
Published: (2012)
by: Ching-Nung, Yang, et al.
Published: (2012)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Security and resilience in intelligent data-centric systems and communication networks
Information security and IT risk management
by: Agrawal, Manish, et al.
by: Agrawal, Manish, et al.
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Building an effective information security policy architecture
by: Bacik, Sandy
Published: (2008)
by: Bacik, Sandy
Published: (2008)
Hardening network infrastructure
by: Noonan, Wesley J.
Published: (2004)
by: Noonan, Wesley J.
Published: (2004)
Fundamentals of network security
by: Canavan, John E.
Published: (2001)
by: Canavan, John E.
Published: (2001)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Schneier on security
by: Schneier, Bruce 1963-
Published: (2008)
by: Schneier, Bruce 1963-
Published: (2008)
No bugs! delivering error-free code in C and C++
by: Thielen, David
Published: (1992)
by: Thielen, David
Published: (1992)
Similar Items
-
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010) -
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003) -
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008) -
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008) -
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)