EUR 77,43
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Handbook of Applied Cryptography (Anglais) Relié – 16 octobre 1996


Voir les 3 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Relié
"Veuillez réessayer"
EUR 77,43
EUR 56,99 EUR 27,84
Relié
"Veuillez réessayer"

A court d'idées pour Noël ?

Offres spéciales et liens associés



Descriptions du produit

Présentation de l'éditeur

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.

The Handbook of Applied Cryptography provides a treatment that is multifunctional:

  • It serves as an introduction to the more practical aspects of both conventional and public-key cryptography
  • It is a valuable source of the latest techniques and algorithms for the serious practitioner
  • It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit
  • It provides a mathematical treatment to accompany practical discussions
  • It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed
    Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.


  • Détails sur le produit

    • Relié: 816 pages
    • Editeur : CRC Press; Édition : 1 (16 octobre 1996)
    • Collection : Discrete Mathematics and Its Applications
    • Langue : Anglais
    • ISBN-10: 0849385237
    • ISBN-13: 978-0849385230
    • Dimensions du produit: 17,8 x 4,3 x 25,4 cm
    • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
    • Classement des meilleures ventes d'Amazon: 81.358 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
    • Table des matières complète
    •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


    En savoir plus sur les auteurs

    Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

    Dans ce livre (En savoir plus)
    Première phrase
    Cryptography has a long and fascinating history. Lire la première page
    En découvrir plus
    Concordance
    Parcourir les pages échantillon
    Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
    Rechercher dans ce livre:

    Commentaires en ligne

    5.0 étoiles sur 5
    5 étoiles
    2
    4 étoiles
    0
    3 étoiles
    0
    2 étoiles
    0
    1 étoiles
    0
    Voir les deux commentaires client
    Partagez votre opinion avec les autres clients

    Commentaires client les plus utiles

    3 internautes sur 3 ont trouvé ce commentaire utile  Par Peter Ortmann sur 15 avril 2002
    Format: Relié
    Mois banché mais plus précis que l’incontournable Bruce Schneier, cet ouvrage et certainement un des livres les plus complets et le plus clair de ma bibliothèque d’informaticien. Pratiquement tous les concepts fondamentaux y sont repris. C’est surtout un appui pour tout professionnel qui désire clarifier un débat parfois difficile. Il ne faut pas être mathématicien pour comprendre et mettre en œuvre les concepts décrits, mais il reste très scientifique.
    Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
    Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
    Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
    Format: Relié
    Parmi tous les livres sur la sécurité informatique, Handbook of Applied Cryptography est de loin le plus rigoureux et le mieux organisé. Les principaux problèmes sont couverts avec des descriptions claires. Les aspects mathématiques sont abordés, sans détails (par ex. des démonstrations) mais sans concession. Un énorme chapitre sur les références permet à ceux qui souhaite approfondir de trouver son bonheur.
    Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
    Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
    Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer

    Commentaires client les plus utiles sur Amazon.com (beta)

    Amazon.com: 23 commentaires
    46 internautes sur 46 ont trouvé ce commentaire utile 
    Excellent reference indeed 27 septembre 2001
    Par Optimistix - Publié sur Amazon.com
    Format: Relié
    If you're going to work in the area of Cryptography, you can't afford
    to neglect this book.
    We used this in a course, and even though it's a handbook, it doubles up
    pretty well as a textbook, since it has all the underlying mathematical
    theory, presented in a clear and concise manner.
    For sheer breadth and depth of coverage, this book is unmatched in the
    field. It may not have enough on some topics to satisfy everyone, but
    then i suspect most such topics were not so prominent in 1996, which
    is when the book was written.
    Starting with number theory, it goes on cover pseudorandom bits and
    sequences, stream and block ciphers, hash functions, and digital signatures,
    establishment protocols, implementation, patents and standards - you name
    it, you got it.
    On the one hand, there's enough theory to make you wonder whether it
    should be called 'applied', but then it indeed qualifies as implementations
    are discussed as well.
    And of course, there's an exhaustive bibliography, with more pointers to
    the literature than one could possibly follow up.
    One word of caution, though : it requires hard work. If you want a more
    'relaxed' coverage of comparable breadth (but not depth), you can do
    worse than look up Bruce Schneier's 'Applied Crypography', which is a
    delightful read, but nowhere as rigorous (read academic) as this one.
    All in all, this is an indispensable reference for those in the field -
    rigorous and exhaustive, yet eminently readable.
    If you still haven't made your mind up, here's one final piece of advice :
    visit the authors'(rather the book's) website, where you'll get the
    implementations of all the algorithms in the book, and a (presumably)
    pleasant surprise :-)
    32 internautes sur 33 ont trouvé ce commentaire utile 
    Thorough and complete 14 juin 1999
    Par Gerardus A. Weijers - Publié sur Amazon.com
    Format: Relié
    Menezes et. al. provide a thorough review of the field of cryptography. It's the first book I grab when I'm looking for something. Much more in depth than Bruce Scheier's "Applied Cryptography"
    18 internautes sur 18 ont trouvé ce commentaire utile 
    A very detailed book, but not for everyone. 13 octobre 2003
    Par Un client - Publié sur Amazon.com
    Format: Relié Achat vérifié
    This is a fairly strong book on crypto, with heavy detail on the math involved. The upside is that the second chapter is devoted to most of the important mathematical theory you'll need to understand for the rest of the book. The downside? That chapter tries to cover just about the same breadth of information as a semester long course in Number Theory.
    If you don't have a ton of mathematical background and are scared of having to take a crash course in number theory, or are looking for a higher level view of things, I'd suggest something more along the lines of Bruce Schneier's 'Applied Cryptography' (ASIN 0471117099). If you have some mathematical background, but want to get into things in detail, this is probably for you.
    If you're not sure whether you'll like the book, you should definitely take a look at it. While Amazon currently doesn't have sample pages, if you do a Web Search on "Handbook of Applied Cryptography", you can find Sample Chapters hosted online to give you a good feel for the book's style.
    14 internautes sur 14 ont trouvé ce commentaire utile 
    An excellent reference for anyone in computer science 25 juin 2002
    Par Hart Wilson - Publié sur Amazon.com
    Format: Relié
    A thorough coverage of topics in cryptography is only one of many features which make this book invaluable to computer scientists. While not intended to be a textbook, this handbook includes enough background information to be of use to those with minimal theoretical computer science knowledge. The chapter organization is logical and very modular so that after reading the introductory chapters, one can skip ahead to the chapters of interest with little difficulty.
    The second chapter provides a concise review of probability theory, information theory, complexity theory, and number theory. This chapter would be helpful to anyone in computer science who already has some discrete math background. For readers with no discrete math background I would recommend first reading "Discrete Mathematics and Its Applications" by Kenneth Rosen, the editor of the series this book belongs to.
    The coverage of number-theoretic problems in chapter 3 is very easy to follow and provides a handy reference to the average case performance of the best known algorithms for each.
    The next few chapters are very math-intensive and outline the most common encryption algorithms and standards with examples. The chapter on block ciphers includes a section on classical ciphers and cryptanalysis which, as a sidenote, might be of interest to students of linguistics.
    The later chapters present protocols for authentication, digital signing, and key management which build on the algorithms of the previous chapters, but can be understood independently.
    One of the final chapters presents methods of effecient computation which again would be useful to anyone in computer science, not just those who are interested in cryptography.
    Overall, the development of the topics in the book is complete (although by no means rigorous) and concise, including examples only where necessary. I highly recommend this book to students who want to learn more about cryptography, anyone whose job requires some knowledge of standards for authentication, digital signing, etc., such as internet security, and any computer scientist who has an academic interest in algorithms and their applications.
    6 internautes sur 6 ont trouvé ce commentaire utile 
    Comprehensive academic treatment 13 septembre 1998
    Par Un client - Publié sur Amazon.com
    Format: Relié
    This book provides what is probably the best, up to date survey of the field. The book is more academically rigourous than Bruce' Applied Cryptography but may be rather tough going for those wanting a more introductory book. On the other hand the price is substantially greater.
    If you want to learn about the number theory behind public key cryptography this book provides the best roadmap.
    Ces commentaires ont-ils été utiles ? Dites-le-nous


    Commentaires

    Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?