HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Everyday Cryptography: Fundamental…
Loading...

Everyday Cryptography: Fundamental Principles and Applications (edition 2012)

by Keith M. Martin

MembersReviewsPopularityAverage ratingConversations
201515,329NoneNone
Member:kcau
Title:Everyday Cryptography: Fundamental Principles and Applications
Authors:Keith M. Martin
Info:Oxford University Press (2012), Paperback, 592 pages
Collections:Your library
Rating:
Tags:None

Work details

Everyday Cryptography: Fundamental Principles and Applications by Keith M. Martin

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No glossary
  Baku-X | Jan 10, 2017 |
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Product Description (ISBN 0199695598, Paperback)

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research.

Everyday Cryptography is a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this fascinating and increasingly important area of technology.

(retrieved from Amazon Thu, 12 Mar 2015 18:24:20 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio
1 wanted

Popular covers

Rating

Average: No ratings.

Is this you?

Become a LibraryThing Author.

 

You are using the new servers! | About | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 117,946,139 books! | Top bar: Always visible