From
OM Books, Sevilla, SE, Spain
Seller rating 5 out of 5 stars
AbeBooks Seller since 27 January 2022
Seller Inventory # 9780470114865
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.
About the Author:
MARK STAMP, PHD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice.
RICHARD M. LOW, PHD, is Lecturer in the Department of Mathematics at San Jose State University. His research interests include cryptography, combinatorics, and group theory.
Title: Applied Cryptanalysis - Breaking Ciphers in ...
Publisher: John Wiley and Sons Ltd
Publication Date: 2007
Binding: Hardcover
Condition: Usado - bueno
Seller: HPB-Red, Dallas, TX, U.S.A.
hardcover. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_422483202
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Hardback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR013865097
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G047011486XI4N00
Seller: thebookforest.com, San Rafael, CA, U.S.A.
Condition: Like New. Signed (inscribed) by author on title page. Page block firm and clean, binding unblemished, boards straight, without markings of any kind. Fine, like new condition. Supporting Bay Area Friends of the Library since 2010. Well packaged and promptly shipped. Seller Inventory # BAY_06_SH_031239
Seller: GoldBooks, Denver, CO, U.S.A.
Condition: new. Seller Inventory # 58A73_89_047011486X
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Feb2215580218885
Seller: CitiRetail, Stevenage, United Kingdom
Hardcover. Condition: new. Hardcover. The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic. This book provides an introduction to applied cryptanalysis, that is, cryptanalysis that actually breaks ciphers and/or systems. The emphasis is on detailed case studies of specific ciphers and attacks. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9780470114865
Quantity: 1 available
Seller: Chiron Media, Wallingford, United Kingdom
Hardcover. Condition: New. Seller Inventory # 6666-WLY-9780470114865
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. New copy - Usually dispatched within 4 working days. Seller Inventory # B9780470114865
Quantity: Over 20 available
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Hardcover. Condition: new. Hardcover. The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic. This book provides an introduction to applied cryptanalysis, that is, cryptanalysis that actually breaks ciphers and/or systems. The emphasis is on detailed case studies of specific ciphers and attacks. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9780470114865