Cryptography engineering : design principles and practical applications
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start
| Main Authors: | Ferguson, Niels (Author), Kohno, Tadayoshi (Author), Schneier, Bruce , 1963- (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, Indiana :
Wiley ,
c2010
|
| Subjects: |
Similar Items
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015)
by: Schneier, Bruce 1963-
Published: (2015)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2008)
by: Hoffstein, Jeffrey, et al.
Published: (2008)
Cyrptography in constant parallel time
by: Applebaum, Benny
Published: (2014)
by: Applebaum, Benny
Published: (2014)
Schneier on security
by: Schneier, Bruce 1963-
Published: (2008)
by: Schneier, Bruce 1963-
Published: (2008)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Secure video transmission using steganography and cryptography
by: Maizatul Auni Mazhar
by: Maizatul Auni Mazhar
Wiley survival guide in global telecommunications broadband access, optical components, and networks, and cryptography
by: Desurvire, Emmanuel 1955-
Published: (2004)
by: Desurvire, Emmanuel 1955-
Published: (2004)
Virtual honeypots from botnet tracking to intrusion detection
by: Provos, Niels, et al.
Published: (2008)
by: Provos, Niels, et al.
Published: (2008)
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014)
by: Hankerson, Darrel R.
Published: (2014)
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2007)
by: Dhillon, Gurpreet 1963-
Published: (2007)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Visual cryptography and secret image sharing
by: Ching-Nung, Yang, et al.
Published: (2012)
by: Ching-Nung, Yang, et al.
Published: (2012)
Computer and cyber security principles, algorithm, applications, and perspectives
Information security : principles and practice
by: Stamp, Mark
Published: (2011)
by: Stamp, Mark
Published: (2011)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Principles of computer security security+TM and beyond
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Similar Items
-
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015) -
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007) -
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003) -
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004) -
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)