Электронная книга: Bruce Schneier «Cryptography Engineering. Design Principles and Practical Applications»
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography. Издательство: "John Wiley&Sons Limited (USD)"
ISBN: 9781118502822 электронная книга Купить за 3577.17 руб и скачать на Litres |
Другие книги автора:
Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|
Bruce Schneier on Trust Set | Save almost 25% on this two-book set from Bruce Schneier covering issues of social trust and security This set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
Liars and Outliers. Enabling the Trust that Society Needs to Thrive | In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
Carry On. Sound Advice from Schneier on Security | Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
Schneier on Security | Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга |
Bruce Schneier
infobox scientist
name = Bruce Schneier
birth_date = Birth date and age|1963|1|15|df=y
residence =
citizenship =
field =
work_institutions =
alma_mater =
known_for =
Bruce Schneier (born
Education
Originally from
Writings on cryptography
Schneier's "Applied Cryptography" is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic
However, Schneier now denounces his early success as a naive, mathematical, and
Writings on computer security and general security
In 2000, Schneier published "Secrets and Lies: Digital Security in a Networked World". In 2003, Schneier published "".
Schneier writes a freely available monthly Internet newsletter on computer and other security issues, "Crypto-Gram", as well as a security Other writing Schneier and his wife, Karen Cooper, write restaurant reviews for a number of Minneapolis papers, including the " Schneier and Cooper were nominated in 2000 for the Individual-i Schneier designed the "individual-i" symbol and released it into public domain to promote In popular culture Schneier's name appears in the Schneier is featured on the Everybody Loves Eric Raymond website in a parody of Publications * Schneier, Bruce. "Applied Cryptography", John Wiley & Sons, 1994. ISBN 0-471-59756-2 ee also * References External links * [http://www.schneier.com/ Personal website, Schneier.com] – includes [http://schneier.com/crypto-gram.html "Crypto-Gram" newsletter] and [http://schneier.com/blog/ "Schneier on Security" blog] Источник: Bruce Schneier
* Schneier, Bruce. "Protect Your Macintosh", Peachpit Press, 1994. ISBN 1-56609-101-2
* Schneier, Bruce. "E-Mail Security", John Wiley & Sons, 1995. ISBN 0-471-05318-X
* Schneier, Bruce. "Applied Cryptography", Second Edition, John Wiley & Sons, 1996. ISBN 0-471-11709-9
* Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. "The Twofish Encryption Algorithm", John Wiley & Sons, 1996. ISBN 0-471-35381-7
* Schneier, Bruce; Banisar, David. "The Electronic Privacy Papers", John Wiley & Sons, 1997. ISBN 0-471-12297-1
* Schneier, Bruce. "Secrets and Lies: Digital Security in a Networked World", John Wiley & Sons, 2000. ISBN 0-471-25311-1
* Schneier, Bruce. "", Copernicus Books, 2003. ISBN 0-387-02620-7
* Ferguson, Niels; Schneier, Bruce. "
*
*
*
*
* [http://votingmachines.procon.org/viewsource.asp?ID=1175 Bruce Schneier] at [http://votingmachines.procon.org/ Voting Machines ProCon.org]
* [http://geekz.co.uk/schneierfacts humorous Bruce Schneier "facts"]
* [http://www.individual-i.com/ individual-i page]
См. также в других словарях:
Kryptographie — (auch: Kryptografie; von altgriechisch κρυπτός kryptós ‚verborgen, geheim‘ und γράφειν gráphein ‚schreiben‘)[1] war ursprünglich die Wissenschaft der Verschlüsselung von Informationen. Heute befasst sie sich allgemein mit dem Thema… … Deutsch Wikipedia
Mathematics and Physical Sciences — ▪ 2003 Introduction Mathematics Mathematics in 2002 was marked by two discoveries in number theory. The first may have practical implications; the second satisfied a 150 year old curiosity. Computer scientist Manindra Agrawal of the… … Universalium
Timeline of Islamic science and engineering — This timeline of Islamic science and engineering covers the general development of science and technology in the Islamic world during the Islamic Golden Age, usually dated from the 7th to 16th centuries.From the 17th century onwards, the advances … Wikipedia
Books on cryptography — have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages mdash; see Kerckhoffs principle. In… … Wikipedia
Mathematics — Maths and Math redirect here. For other uses see Mathematics (disambiguation) and Math (disambiguation). Euclid, Greek mathematician, 3r … Wikipedia
List of computer science conferences — This is a list of academic conferences in computer science. Most of these academic conferences are annual or bi annual events.The order with which the conferences are listed in their respective fields corresponds to a rough and non authoritative… … Wikipedia