27,53 €
30,59 €
-10% with code: EXTRA
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation
27,53
30,59 €
  • We will send in 10–14 business days.
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
30.59
  • SAVE -10% with code: EXTRA

NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation (e-book) (used book) | bookbook.eu

Reviews

Description

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.

EXTRA 10 % discount with code: EXTRA

27,53
30,59 €
We will send in 10–14 business days.

The promotion ends in 21d.16:39:03

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,31 Book Euros!?

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)