Applied Cryptography: (Record no. 35222)
[ view plain ]
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
---|---|
ISBN | 9781119439028 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.13 |
Author Mark | SCH-A |
100 ## - MAIN ENTRY--AUTHOR | |
Author Name | Schneier, Bruce |
245 ## - TITLE STATEMENT | |
Title | Applied Cryptography: |
Sub-Title | Protocols, Algorithms and Source Code in C |
250 ## - EDITION STATEMENT | |
Edition statement | 20th Anniversary Edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Name of publisher, distributor, etc. | Wiley |
Date of publication, distribution, etc. | 2015 |
300 ## - PHYSICAL DESCRIPTION | |
Pages | xxv, 756p. |
500 ## - GENERAL NOTE | |
General note | From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Index included |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject / Department | Network Protocols — Security Cryptographic Algorithms Computer Security — Algorithms Network Security Protocols Programming Languages (C) — Security Applications Computer Algorithms — Implementation (C Language) Cybersecurity — Software Development Secure Coding Practices — C Language Encryption — Algorithms and Source Code Security Protocols — Design and Analysis Cybersecurity — Algorithms and Protocols |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Not for loan | Collection code | Permanent Location | Current Location | Shelving Location | Date acquired | Source of acquisition | Price | Inventory number | Full Call Number | Accession No./Barcode | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cyber Security | Air University Central Library Islamabad | Air University Central Library Islamabad | Cyber Security | 05/12/2025 | Ali Book Service | 3474.00 | AUCL-0415 | 005.13 SCH-A | P14201 | 06/30/2025 | Book |