Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

Buy

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security.

For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments.

During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come.

Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business.

(HTML tags aren't allowed.)

Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java Applications (The Java Series)
Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java Applications (The Java Series)
Filthy Rich Clients refers to ultra-graphically rich applications that ooze cool. They suck the user in from the outset and hang on to them with a death grip of excitement. Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Javaâ„¢ Applications shows you how to...
Absolute BSD: The Ultimate Guide to FreeBSD
Absolute BSD: The Ultimate Guide to FreeBSD
    Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
    By the time you finish this book, you
...
Pro iOS 5 Augmented Reality
Pro iOS 5 Augmented Reality
Welcome to Pro iOS 5 Augmented Reality. Augmented reality (AR) has existed in sci-fi movies for decades, is used in the military for head-up displays (HUDs), and until recently, has been a thing of the future. With the upswing in mobile applications since the introduction of the iPhone and the Android operating system, applications...

Geopositioning and Mobility (ISTE)
Geopositioning and Mobility (ISTE)

This book presents a general overview of the applications and use of geopositioning and GNSS for assisting the supervision and management of mobile terrestrial professions, information, traffic regulation, multimodal information, pedestrian mobility and indoor geopositioning, etc. It especially focuses on the field of mobility and terrestrial...

Spatial Cognition V: Reasoning, Action, Interaction (Lecture Notes in Computer Science)
Spatial Cognition V: Reasoning, Action, Interaction (Lecture Notes in Computer Science)
This is the fifth volume in a series of book publications featuring basic interdisciplinary research in spatial cognition. The study of spatial cognition is the study of knowledge about spatial properties of objects and events in the world. Spatial properties include location, size, distance, direction, separation and connection, shape, pattern,...
Windows 10 Development with XAML and C# 7
Windows 10 Development with XAML and C# 7

Benefit from a nuts-and-bolts examination of how XAML and C# 7 fit together and obtain a foundation for getting up and running with Windows 10. Once you have a good understanding of the basics, you progress to more...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy