Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms, protocols, and methods of design and analysis, rendering algorithms in readable pseudocode and simple graphics and diagrams.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.