This book is intended for security professionals who want to learn how to encrypt data, evaluate and compare encryption methods, and how to attack them.