CDN$ 62.72
  • List Price: CDN$ 84.00
  • You Save: CDN$ 21.28 (25%)
Only 5 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Applied Cryptography: Pro... has been added to your Cart

Ship to:
To see addresses, please
Or
Please enter a valid postal code.
Or
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Applied Cryptography: Protocols, Algorithms and Source Code in C Hardcover – Mar 30 2015

4.0 out of 5 stars 93 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Hardcover
CDN$ 62.72
CDN$ 62.72 CDN$ 90.51

Deals in books

click to open popover

Frequently bought together

  • Applied Cryptography: Protocols, Algorithms and Source Code in C
  • +
  • Cryptography Engineering: Design Principles and Practical Applications
  • +
  • Cryptanalysis: A Study of Ciphers and Their Solution
Total price: CDN$ 120.79
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.



Product details

  • Hardcover: 784 pages
  • Publisher: Wiley; 20 edition (March 30 2015)
  • Language: English
  • ISBN-10: 1119096723
  • ISBN-13: 978-1119096726
  • Product Dimensions: 19.8 x 4.1 x 24.4 cm
  • Shipping Weight: 1.4 Kg
  • Average Customer Review: 4.0 out of 5 stars 93 customer reviews
  • Amazon Bestsellers Rank: #48,672 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?

  • See Complete Table of Contents

Product description

From the Inside Flap

This smart, relevant guide is a must for all those committed to computer and cyber security. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. This book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and keeping keys secure. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.

From the Back Cover

Praise for Applied Cryptography

"This book should be on the shelf of any computer professional involved in the use or implementation of cryptography."
— IEEE Software

"An encyclopedic survey ... could well have been subtitled 'The Joy of Encrypting' ... a useful addition to the library of any active or would-be security practitioner."
— Cryptologia

"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..."
— Wired magazine

"...easily ranks as one of the most authoritative in its field..."
— PC magazine

"...monumental...fascinating...comprehensive...the definitive work on cryptography for computer programmers..."
— Dr. Dobb's journal

Written by the world's most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.

Included in this edition:

  • Exclusive forward by Bruce Schneier
  • Ways to defeat the key escrow mechanism
  • Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
  • Protocols for digital signatures, authentication, secure elections, digital cash, and more
  • Detailed information on key management and cryptographic implementations

See all Product description

What other items do customers buy after viewing this item?


Customer reviews

Top customer reviews

on June 8, 2017
Format: Hardcover|Verified Purchase
0Comment|Was this review helpful to you?YesNoReport abuse
on November 26, 2000
Format: Hardcover
0Comment|Was this review helpful to you?YesNoReport abuse
on May 28, 2004
Format: Paperback
0Comment| 2 people found this helpful. Was this review helpful to you?YesNoReport abuse
on December 12, 1996
Format: Paperback
0Comment|Was this review helpful to you?YesNoReport abuse

Most recent customer reviews

Where's My Stuff?

Delivery & Returns

Need Help?