By selecting the 'Susbcribe & Save' option you are enrolling in an auto-renewing subscription of Zookal Study Premium. Cancel at anytime.
Auto-Renewal
Your Zookal Study Premium subscription will be renewed each month until you cancel. You consent to Zookal automatically charging your payment method on file $19.99 each month after 1st month free period until you cancel.
How to Cancel
You can cancel your subscription anytime by visiting Manage account page, clicking "Manage subscription" and completing the steps to cancel. Cancellations take effect at the end of the 1st month free period (if applicable) or at the end of the current billing cycle in which your request to cancel was received. Subscription fees are not refundable.
Zookal Study Premium Monthly Subscription Includes:
Ability to post up to five (5) questions per month.
0% off your textbooks order and free standard shipping whenever you shop online at
textbooks.zookal.com.au
Unused monthly subscription benefits have no cash value, are not transferable, and expire at the end of each month. This means that subscription benefits do not roll over to or accumulate for use in subsequent months.
Payment Methods
Afterpay and Zip Pay will not be available for purchases with Zookal Study Premium subscription added to bag.
$1 preauthorisation
You may see a $1 preauthorisation by your bank which will disappear from your statement in a few business days..
Email communications
By adding Zookal Study Premium, you agree to receive email communications from Zookal.
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.