From: Anonymous <anon@anon.efga.org>
To: cypherpunks@toad.com
Message Hash: 7e2fe4a60e936e14caedf6f0d373c5d2eb28b740073f43e2f38e153de2736b28
Message ID: <95792e88678c7034939f0d6dcc5a10ed@anon.efga.org>
Reply To: N/A
UTC Datetime: 1998-02-24 16:43:41 UTC
Raw Date: Tue, 24 Feb 1998 08:43:41 -0800 (PST)
From: Anonymous <anon@anon.efga.org>
Date: Tue, 24 Feb 1998 08:43:41 -0800 (PST)
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <95792e88678c7034939f0d6dcc5a10ed@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain
Michael Elder wrote:
>
> trei@ziplink.net wrote:
>
> >>Applied Cryptography: Protocols, Algorithms, and Source Code in C,
> >Second Edition, by Bruce Schneier. Copyright 1995, John Wiley & Sons,
> >Inc. All rights reserved.
> >For those wondering: Applied Cryptography includes the source code
> >appendix. I have not checked if it has the 5th printing corrections.
>
> Just a little note of interest, AC is currently in its sixth printing. I
> just got it last week.
>
> -E.
I noticed the sixth printing in Barnes and Noble 2 weeks ago. I didn't
have too long to peruse thru it... Are there any big error corrections/
other reasons to pay any close attention to the new printing?
-Anon
Return to February 1998
Return to “Michael Elder <melder@descartes.coker.edu>”