You May Also Like

Applied Cryptography: Protocols, Algorithms, and Source Code in C (Paperback)

Earn 2% in Rewards on this order
FREE with Club O Silver.




2% Rewards

Keep shopping on Overstock

Exclusive Offers

Straight to your inbox

5% Dining Rewards

Get paid to go out tonight



5% Rewards

Earn even faster

Exclusive Offers

Straight to your inbox

5% Dining Rewards

Get paid to go out tonight

Free Shipping

Never pay extra

Exclusive Rewards

Save big-- up to 40%

Today: $36.74
Free Shipping*
ITEM# 3174798
  • Delivery Estimate

    Select a Product Option to view shipping

    • Product Alerts

      Stay in the know! Choose which alerts you’d like to receive on this product.

    Applied Cryptography: Protocols, Algorithms, and Source Code in C (Paperback)
    • Wishlists
    • Save for Later


    ITEM#: 3174798

    BRUCE SCHNEIER is President of Counter-pane Systems, a consulting firm specializing in cryptography and computer security. He is a contributing editor to Dr. Dobb's Journal, serves on the board of directors of the International Association of Cryptologic Research, and is a member of the Advisory Board for the Electronic Privacy Information Center. He is the author of E-Mail Security (Wiley) and is a frequent lecturer on cryptography, computer security, and privacy.
    ". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

    ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

    ". . .easily ranks as one of the most authoritative in its field." -PC Magazine

    ". . .the bible of code hackers." -The Millennium Whole Earth Catalog

    This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

    What's new in the Second Edition?
    * New information on the Clipper Chip, including ways to defeat the key escrow mechanism
    * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
    * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
    * More detailed information on key management and cryptographic implementations


    ISBN 9780471117094
    Genre COMPUTERS / Security / General
    Format Paperback
    Pages 758
    Publisher Date 1995-11-01 00:00:00.0
    Publisher John Wiley & Sons Inc
    Copyright Year 1996
    Height 9.25 in
    Wdth 7.5 in
    Thickness 1.5 in
    Unit weight 2.95 lb
    Language English
    Subtitle Protocols, Algorithms, and Source Code in C
    Edition Number 2
    Edition Detail Revised
    Audience College/higher education
    Authors Schneier, Bruce

    Product Reviews

    Questions & Answers

    Yay! Be the first to ask a question about this product.
    Get your product questions answered right here.

    Shopping Tips & Inspiration

    Shipping & Returns


    This item will be delivered to you via USPS Trackable Media Mail or UPS Mail Innovations and will take from 2 days to 3 weeks from the time the item leaves our warehouse. *

    Standard Return Policy:

    Items must be returned in new or unused condition and contain all original materials included with the shipment. More Details

    FINAL SALE EXCLUSION: Items marked as FINAL SALE are not returnable unless the problem you experience is the result of our error.

    For your protection, all orders are screened for security purposes. If your order is selected for review, our Loss Prevention Team may contact you by phone or email. There may be a two business day delay to process your order.

    ** Most Oversize orders are delivered within 1-4 weeks. Some orders may take 6 weeks to be delivered.

    You May Also Like