LEADER 04297nam 2200685Ia 450 001 9910451061503321 005 20200520144314.0 010 $a1-281-07185-4 010 $a9786611071851 010 $a0-08-050345-4 024 0 $z9781597491044 035 $a(CKB)1000000000298111 035 $a(EBL)319199 035 $a(OCoLC)181421142 035 $a(SSID)ssj0000074341 035 $a(PQKBManifestationID)11171374 035 $a(PQKBTitleCode)TC0000074341 035 $a(PQKBWorkID)10119639 035 $a(PQKB)10455096 035 $a(MiAaPQ)EBC319199 035 $a(CaSebORM)1597491047 035 $a(PPN)170245802 035 $a(Au-PeEL)EBL319199 035 $a(CaPaEBR)ebr10151834 035 $a(CaONFJC)MIL107185 035 $a(OCoLC)162597560 035 $a(EXLCZ)991000000000298111 100 $a20061211d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography for developers$b[electronic resource] /$fTom St Denis, Simon Johnson 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing, Inc.$dc2007 215 $a1 online resource (449 p.) 300 $aIncludes index. 311 $a1-59749-104-7 327 $aFront Cover; Cryptography for Developers; Copyright Page; Contents; Preface; Chapter 1. Introduction; Introduction; Threat Models; What Is Cryptography?; Asset Management; Common Wisdom; Developer Tools; Summary; Organization; Frequently Asked Questions; Chapter 2. ASN.1 Encoding; Overview of ASN.1; ASN.1 Syntax; ASN.1 Data Types; ASN.1 Length Encodings; ASN. 1 Boolean Type; ASN.1 Integer Type; ASN.1 BIT STRING Type; ASN.1 OCTET STRING Type; ASN.1 NULL Type; ASN.1 OBJECT IDENTIFIER Type; ASN.1 SEQUENCE and SET Types; ASN.1 PrintableString and IA5STRING Types; ASN.1 UTCTIME Type 327 $aIniplementationASN.1 Length Routines; ASN.1 Primitive Encoders; Putting It All Together; Frequently Asked Questions; Chapter 3. Random Number Generation; Introduction; Measuring Entropy; How Bad Can It Be?; RNG Design; PRNG Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 4. Advanced Encryption Standard; Introduction; Implementation; Practical Attacks; Chaining Modes; Putting It All Together; Frequently Asked Questions; Chapter 5. Hash Functions; Introduction; Designs of SHS and Implementation; PKCS # 5 Key Derivation; Putting It All Together 327 $aFrequently Asked QuestionsChapter 6. Message-Authentication Code Algorithms; Introduction; Security Guidelines; Standards; Cipher Message Authentication Code; Hash Message Authentication Code; Putting It All Together; Frequently Asked Questions; Chapter 7. Encrypt and Authenticate Modes; Introduction; Design and Implementation; Putting It All Together; Frequently Asked Questions; Chapter 8. Large Integer Arithmetic; Introduction; What Are BigNums?; The Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 9. Public Key Algorithms; Introduction 327 $aGoals of Public Key CryptographyRSA Public Key Cryptography; Elliptic Curve Cryptography; Putting It All Together; Frequently Asked Questions; Index 330 $aThe only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on 606 $aComputer software$xDevelopment 606 $aCryptography 608 $aElectronic books. 615 0$aComputer software$xDevelopment. 615 0$aCryptography. 676 $a005.8/2 676 $a005.82 700 $aSt. Denis$b Tom$0627563 701 $aJohnson$b Simon$0125487 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451061503321 996 $aCryptography for developers$92116723 997 $aUNINA LEADER 01842nam 2200409Ia 450 001 9910695381703321 005 20161214082650.0 035 $a(CKB)5470000002368930 035 $a(OCoLC)71428787 035 $a(EXLCZ)995470000002368930 100 $a20060921d1988 ua 0 101 0 $aeng 135 $aurcn| ||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRehabilitating interiors in historic buildings$b[electronic resource] $eidentifying and preserving character-defining elements /$fH. Ward Jandl 210 1$aWashington, D.C. :$cTechnical Preservation Services, National Park Service, U.S. Dept. of the Interior,$d[1988] 215 $a1 electronic text $cHTML file 225 1 $aPreservation briefs ;$v18 300 $aTitle from title screen (viewed on Sept. 20, 2006). 300 $a"October 1988." 300 $a"The web versions of the Preservation Briefs differ somewhat from the printed versions. Many illustrations are new, captions are simplified, illustrations are typically in color rather than black and white, and some complex charts have been omitted." 320 $aIncludes bibliographical references. 517 $aRehabilitating interiors in historic buildings 606 $aInterior architecture$xConservation and restoration 606 $aHistoric buildings$xConservation and restoration 615 0$aInterior architecture$xConservation and restoration. 615 0$aHistoric buildings$xConservation and restoration. 700 $aJandl$b H. Ward$01383383 712 02$aUnited States.$bNational Park Service.$bTechnical Preservation Services Branch. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695381703321 996 $aRehabilitating interiors in historic buildings$93428178 997 $aUNINA