A highly experienced computer book author and expert in the area of security and communications provides experienced programmers with a step-by-step examination of the development of encryption techniques, from the Caesar Cipher through modern-day public and private key encryption methods.