|
|
|
![]() |
![]() |
![]() |
![]() |
IBM : developerWorks : Security : Education - online courses![]() | ![]() ![]() ![]() ![]() |
![]() |
![]() | |||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
![]() | |||||
![]() |
![]() | ||||
The nearly definitive beginning book for cryptological topics is Bruce Schneier's Applied Cryptography (Wiley). I could not have written this tutorial without my copy of Schneier on my lap to make sure I got everything just right. Online, a good place to start in cryptology is the Cryptography FAQ. To keep up on current issues and discussions, I recommend subscribing to the Usenet group sci.crypt. |
![]() | |||||
![]() | |||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
![]() |
|
|