Learn Encryption Techniques with BASIC and C++

Front Cover
Wordware Pub., 1999 - Computers - 401 pages
"Learn Encryption Techniques with Visual Basic 98" provides readers with a step-by-step examination of the development of encryption techniques first explained in detail, followed by the development of program modules in Visual Basic 98 that illustrate how the data is coded. Through the use of Visual Basic 98, the program modules are then used to develop Windows-based programs that illustrate encryption and decryption of data. This book provides programmers and developers with detailed, practical, hands-on information and examples that illustrate how messages, files, and notes can be programmed with different levels of security.

Effective encryption techniques is an important topic of concern among programmers and developers. By explaining key communications security concepts while providing in-depth coverage of the development, operation, and utilization of a variety of encryption methods, "Learn Encryption Techniques" is suitable for programmers new to the field of security as well as more experienced developers.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.


Technology and Terminology
Monoalphabetic Substitution Concepts
KeywordBased Monoalphabetic Substitution

8 other sections not shown

Common terms and phrases

About the author (1999)

Gilbert Held is an internationally recognized author and lecturer who specializes in the application of computer and communications technology. The author of over 40 books covering personal computers, data communications, and business trade topics, he is the only person to twice win the competitive Karp Interface Award. A winner, as well, of the American Publishers Institute and numerous other industry awards, Mr. Held was selected by Federal Computer Week as one of the top 100 persons in government, industry, and academia who has made a difference in the acquisition and use of computer systems. Among his other books are Voice Over Data Networks; Cisco Security Architecture; Cisco Router Performance Field Guide; and Voice/Data Internetworking, all from McGraw-Hill.

Bibliographic information