Publisher's Synopsis
Rather than focusing on theory, this text describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques that will help practitioners to protect their data and computing resources as fully as possible.