Abstract: Describes dozens of cryptography algorithms and gives practical advice on how to implement them.
Keywords: book review, conspiracy, internet, programming, clipper chip, digital signature, encryption, authentication, digital cash, key management, computer security measures, telecommunication, cryptography.
book cover
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition
Author: Bruce Schneier
Publisher: John Wiley and Sons
Date Published: October 1995
ISBN: 0471117099
LOCN: QA76.9.A25S35 1996
Dewey: 005.8/2 20
Pages: 758
Bibliography: 1653
Figures: 112
Click below to buy the book
[Book price/availability varies]
Buy from Amazon


This book is on my shelf awaiting further review. under construction icon


Author:        Schneier, Bruce, 1963-
Title:         Applied cryptography : protocols, algorithms, and
                  source code in C / Bruce Schneier.
Edition:       2nd ed.
Published:     New York : Wiley, c1996.
Description:   xxiii, 758 p. : ill. ; 24 cm.
LC Call No.:   QA76.9.A25S35 1996
Dewey No.:     005.8/2 20
ISBN:          0471128457 (cloth : acid-free paper)
               0471117099 (paper : acid-free paper)
Notes:         Includes bibliographical references (p. 675-741)
                  and index.
Subjects:      Computer security.
               Telecommunication -- Security measures.
Control No.:   95012398 


I have taken this program and I highly recommend it to all health-care providers - Orville R. Weyrich, Jr PhD NMD.
Functional Diagnostic Medicine banner ad
For more information, see: The CSI Report and Video and Become a New Patient Magnet

Copyright © 1998     Orville R. Weyrich, Jr.