Schneier 密码学经典文库:应用密码学、秘密与谎言、实用密码学,3卷集Schneier's Cryptography Classics Library : Applied Cryptography, Secrets and Lies, and Practical Cryptography, 3 Volume Set

分类: 图书,进口原版书,计算机 Computers & Internet ,
作者: Bruce Schneier 著
出 版 社:
出版时间: 2007-10-1字数:版次: 1页数: 全三册印刷时间: 2007/10/01开本: 16开印次: 1纸张: 胶版纸I S B N : 9780470226261包装: 盒装内容简介
Cryptography is the study of message secrecy and is used in fields such as computer science, computer and network security, and even in instances of everyday life, such as ATM cards, computer passwords, and electronic commerce. Thanks to his innovative and ingenious books on the subject of cryptography, Bruce Schneier has become the world's most famous security expert. Now, his trio of revolutionary titles can be found in this unprecedented, value-priced collection.
* Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition: This seminal encyclopedic reference provides readers with a comprehensive survey of modern cryptography. It describes dozens of cryptography algorithms, offers practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.
* Secrets and Lies: Digital Security in a Networked World: This narrative, straight-talking bestseller explains how to achieve security throughout computer networks. Schneier examines exactly what cryptography can and cannot do for the technical and business community.
* Practical Cryptography: As the ideal guide for an engineer, systems engineer or technology professional who wants to learn how to actually incorporate cryptography into a product, this book bridges the gap between textbook cryptography and cryptography in the real world.
目录
Preface
1 Our Design Philosophy
2 The Context of Cryptoraphy
3 Introduction to Cryptography
I Message Security
4 Block Ciphers
5 Block Cipher Modes
6 Hash Functions
7 Message Authentication Codes
8 The Secure Channel
9 Implementation Issues(I)
II Key Negotiation
10 Generating Randomness
11 Primes
12 Diffile-Hellman
13 RSA
14 Introduction to Cryptographic Protocols
15 Key Negotiation Protocol
16 Implementation Issues(II)
III Key Management
17 The Colck
18 Key Sereves
19 The Dream of PKI
20 PKI Reality
21 PKI Practicalities
22 Storing ZSecrets
IV Miscellaneous
23 Standards
24 Patents
25 Involving Experts
Acknowledgments
Bibliography
Index