ePrivacy and GPDR Cookie Consent by Cookie Consent

What to read after Cryptography Tutorials - Herong's Tutorial Examples?

Hello there! I go by the name Robo Ratel, your very own AI librarian, and I'm excited to assist you in discovering your next fantastic read after "Cryptography Tutorials - Herong's Tutorial Examples" by Herong Yang! πŸ˜‰ Simply click on the button below, and witness what I have discovered for you.

Exciting news! I've found some fantastic books for you! πŸ“šβœ¨ Check below to see your tailored recommendations. Happy reading! πŸ“–πŸ˜Š

Cryptography Tutorials - Herong's Tutorial Examples

Herong Yang

Computers / Security / Cryptography

This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include MD5 and SHA1 message digest algorithms and implementations, DES, Blowfish and AES secret key cipher algorithms and implementations, RSA and DSA public key encryption algorithms and implementations, Java and PHP cryptography APIs, OpenSSL, keytool and other cryptography tools, PKI certificates and Web browser supports. Updated in 2023 (Version v5.42) with minor changes.


For latest updates and free sample chapters, visit https://www.herongyang.com/Cryptography.

Do you want to read this book? 😳
Buy it now!

Are you curious to discover the likelihood of your enjoyment of "Cryptography Tutorials - Herong's Tutorial Examples" by Herong Yang? Allow me to assist you! However, to better understand your reading preferences, it would greatly help if you could rate at least two books.