Applied cryptography protocols, algorithms, and source code in C
Saved in:
| Main Author: | Schneier, Bruce 1963 (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
2015
|
| Edition: | 20th anniversary edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Contemporary cryptology the science of information integrity
Published: (1992)
Published: (1992)
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Cryptography a very short introduction
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Cryptography demystified
by: Hershey
Published: (2003)
by: Hershey
Published: (2003)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
Identity-based cryptography
Published: (2009)
Published: (2009)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Cryptography theory and practice
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
Cryptography theory and practice
by: Stinson lhDouglas R.
by: Stinson lhDouglas R.
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2010)
by: Hoffstein, Jeffrey, et al.
Published: (2010)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
An introduction to cryptography
by: Mollin, Richard A. 1947-
Published: (2000)
by: Mollin, Richard A. 1947-
Published: (2000)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Foundations of cryptography
by: Goldreich, Oded
Published: (2003)
by: Goldreich, Oded
Published: (2003)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
International journal of cryptology research
Published: (2009)
Published: (2009)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Dissappearing cryptography information hiding steganography & watermarking
by: Wayner, Peter 1964-
Published: (2009)
by: Wayner, Peter 1964-
Published: (2009)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2014)
by: Hoffstein, Jeffrey, et al.
Published: (2014)
Introduction to cryptography
by: Padhye, Sahadeo, et al.
Published: (2018)
by: Padhye, Sahadeo, et al.
Published: (2018)
Similar Items
-
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996) -
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005) -
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015) -
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008) -
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)


