Part VIII
Additional Resources

A Cryptography Assumptions and Principles
 A.1 Assumptions
 A.2 Principles
B Data Formats
 B.1 Common Data Formats
 B.2 Conversions using Linux
 B.3 Conversions using Python
C Organisations and People in Cryptography
 C.1 Organisations in Cryptography and Security
 C.2 People in Cryptography and Security
D Versions of this Book