Practical Cryptography / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $24.49
Usually ships in 1-2 business days
(Save 67%)
Other sellers (Hardcover)
  • All (3) from $24.49   
  • Used (3) from $24.49   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$24.49
Seller since 2008

Feedback rating:

(2152)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Very Good
047122894X Item in very good condition and at a great price! Textbooks may not include supplemental items i.e. CDs, access codes etc... All day low prices, buy from us sell to us ... we do it all!! Read more Show Less

Ships from: Aurora, IL

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Express, 48 States
$74.08
Seller since 2014

Feedback rating:

(267)

Condition: Good
Possible retired library copy, some have markings or writing. May or may not include accessories such as CD or access codes.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$74.09
Seller since 2014

Feedback rating:

(267)

Condition: Very Good
Very good.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Cryptography, as Bruce Schneier keeps pointing out to anyone who’ll listen, is even harder than it looks. Of course, it doesn’t help that many books on the subject are intensely academic. Such books do little for folks who actually have to implement crypto-based security. No wonder so many implementations are so poor.

Schneier, president of Counterpane Internet Security, Inc., is arguably the world’s leading crypto expert. His firm’s lead cryptographer, Niels Ferguson, isn’t far behind. Together, they’ve written Practical Cryptography to give implementers what they need to do the job right.

As Schneier often notes, excellent algorithms and protocols do exist: The devil’s in the implementation details, and plenty of companies get them wrong. Worse, the algorithms and protocols are the “easy” part. Once you get people into the loop -- as with key management -- things get really tough. Still worse, nonspecialists often treat crypto as an afterthought, to be bolted on once everything else is done. That’s a recipe for failure, considering that you have to secure your entire system: Your adversary need only find one weak link.

These are the types of issues Practical Cryptography takes on.

Schneier and Ferguson begin with some serious attitude adjustment. To build secure systems, security must come first, with other priorities (like performance or new features) way down the list. “If you are ever tempted to cut a security corner in the name of efficiency, just repeat to yourself: ‘We already have enough fast, insecure systems. We don’t need another one.’ ”

They also focus on keeping things simple -- which means lots of modularization. To that end, they present (and in some cases, create) simple interfaces for cryptographic primitives: “No features, no options, no special cases, no extra things to remember, just the simplest definition we could come up with.”

After introducing cryptography from the implementer’s standpoint, they present several key elements of cryptography systems. In two full chapters on block ciphers, they help you compare and choose amongst solutions like AES, Serpent, and Twofish; then cover block cipher modes, and help you limit the risks of information leakage. There’s a full chapter on hash functions, their weaknesses, solutions -- and tradeoffs.

Next, the authors move on to solving real-world problems, starting with one of the most common: creating secure connections. There’s detailed coverage of secure software development: everything from wiping state to handling swap files and caches -- not to mention buffer overflows, side-channel attacks, and the like.

A section on key negotiation addresses everything from generating randomness to working with primes; using Diffie-Hellman and RSA algorithms to handling crypto protocols. The authors cover key management in comparable depth: implementing reliable clocks; Kerberos and its alternatives; and the practical realities of PKI implementation (for example, why keys “wear out.”)

Practical Cryptography reaches far and wide, from algorithms and protocols to standards and patents -- with plenty of cautions to make sure you never get overconfident. Because, when it comes to security, overconfidence is fatal. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.

From the Publisher
"...the insight into the world of security that is offered here makes for an interesting read...any readers who are responsible for network and data security will find plenty of valuable pointers..." (PC Utilities, June 2003)

"...absolutely brilliantly written.... I loved the chapters on PKI...a must read!..." (Information Security Bulletin, July 2003)

Read More Show Less

Product Details

  • ISBN-13: 9780471228943
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 4/4/2003
  • Edition number: 1
  • Pages: 432
  • Product dimensions: 7.52 (w) x 9.56 (h) x 1.17 (d)

Meet the Author

NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large-scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.

BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed-security monitoring company. A world-renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).

Read More Show Less

Table of Contents

Preface.

1. Our Design Philosophy.

2. The Context of Cryptography.

3. Introduction to Cryptography.

I Message Security.

4. Block Ciphers.

5. Block Cipher Modes.

6. Hash Functions.

7. Message Authentication Codes.

8. The Secure Channel.

9. Implementation Issues ( I )

II Key Negotiation.

10. Generating Randomness.

11. Primes.

12. Diffie-Hellman.

13. RSA.

14. Introduction to Cryptographic Protocols.

15. Key Negotiation Protocol.

16. Implementation Issues ( II ).

III Key Management.

17. The Clock.

18. Key Servers.

19. The Dream of PKI.

20. PKI Reality.

21. PKI Practicalities.

22. Storing Secrets.

IV Miscellaneous.

23. Standards.

24. Patents.

25. Involving Experts.

Acknowledgments.

Bibliography.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)