Every e-mail message, every online purchase, and every cell phone call gets encrypted at one end of its journey and decrypted at the other. Now an everyday application, crypto is part of the job description for network designers, corporate security officers, and telecom developers. Here is a painless way to learn the basic concepts of cryptography for application in communications. While most books on the subject are full of math theory and complex algorithms, this book is not a text and has nothing to memorize -- it ...
Read More
Every e-mail message, every online purchase, and every cell phone call gets encrypted at one end of its journey and decrypted at the other. Now an everyday application, crypto is part of the job description for network designers, corporate security officers, and telecom developers. Here is a painless way to learn the basic concepts of cryptography for application in communications. While most books on the subject are full of math theory and complex algorithms, this book is not a text and has nothing to memorize -- it teaches by doing as readers work through 32 modules supported by exercises and answers. -- Provides a short, focused, fun experience for readers -- Teaches best practice in cryptography -- Proven technique -- used successfully by engineering students and short-course instructors for over six years
Read Less