Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

Buy

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security.

For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments.

During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come.

Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business.

(HTML tags aren't allowed.)

Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
"In recent years, comprehensive texts have been written for several of the other major areas of Artificial Intelligence, including machine learning, natural-language processing, and constraint-satisfaction processing, but until now, the field of planning has been devoid of such a resource, despite the considerable number of advances in and the...
Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking
Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking
Your Guide to Easy and Secure Windows Vista Networking is a complete beginner’s guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you’ll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and...
An Introduction to Control Systems
An Introduction to Control Systems

This significantly revised edition presents a broad introduction to Control Systems and balances new, modern methods with the more classical. It is an excellent text for use as a first course in Control Systems by undergraduate students in all branches of engineering and applied mathematics. The book contains: A comprehensive coverage of...


C/C++ Programmer's Reference, Third Edition
C/C++ Programmer's Reference, Third Edition

Legendary programming author Herbert Schildt distills and organizes the essential elements of C and C++ into a convenient and easy-to-use format that gives you quick, accurate answers to your C/C++ programming questions. You’ll quickly locate clear, concise explanations of the C and C++ programming syntax, keywords, operators,...

Learn JavaScript with p5.js: Coding for Visual Learners
Learn JavaScript with p5.js: Coding for Visual Learners
Learn coding from scratch in a highly engaging and visual manner using the vastly popular JavaScript with the programming library p5.js. The skills you will acquire from this book are highly transferable to a myriad of industries and can be used towards building web applications, programmable robots, or generative art. 
...
Oxford Handbook of the History of Mathematics (Oxford Handbooks)
Oxford Handbook of the History of Mathematics (Oxford Handbooks)

This Handbook explores the history of mathematics under a series of themes which raise new questions about what mathematics has been and what it has meant to practice it. It addresses questions of who creates mathematics, who uses it, and how. A broader understanding of mathematical practitioners naturally leads to a new appreciation of what...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy