Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

Buy

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security.

For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments.

During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come.

Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business.

(HTML tags aren't allowed.)

Advanced Dynamic-system Simulation: Model-replication Techniques and Monte Carlo Simulation
Advanced Dynamic-system Simulation: Model-replication Techniques and Monte Carlo Simulation
Simulation is experimentation with models. This book describes new computer programs for interactive modeling and simulation of dynamic systems, such as aerospace vehicles, control systems, and biological systems. Simulation studies for design or research can involve many hundreds of model changes, so programming must be convenient, and...
Sams Teach Yourself Drupal in 24 Hours
Sams Teach Yourself Drupal in 24 Hours

In just 24 sessions of one hour or less, learn how to build powerful, easy-to-maintain websites with Drupal–fast! Using this book’s straightforward, step-by-step approach, you’ll master every skill you’ll need, from organizing sites and using Drupal’s design themes to setting up search,...

Feedback Control for Computer Systems
Feedback Control for Computer Systems

How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through case studies and hands-on simulations, you’ll learn methods to...


Master Data Management and Customer Data Integration for a Global Enterprise
Master Data Management and Customer Data Integration for a Global Enterprise

This book is about interesting and exciting new developments in the area of information management. These developments are focused on new ways of structuring, choosing, understanding, and integrating information that is needed to run a business, service customers, and comply with numerous regulatory requirements.

To...

Java for the Beginning Programmer
Java for the Beginning Programmer

Java for the Beginning Programmer teaches Java to someone with absolutely no programming background. This book focuses on core programming topics such as variables, looping, subroutines, and program layout. This course focuses on real programming techniques, and not using an Integrated Development Environment (IDE) to generate code. This...

Formal Methods: State of the Art and New Directions
Formal Methods: State of the Art and New Directions

The last decade has witnessed a modest but sustained increase in researching and applying formal methods. A number of well cited success stories are now available and provide strong evidence that formal methods can be effective and deployed in industrial-scale applications.

Through fundamental contributions from leading researchers, this...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy