Introduction - If you have any usage issues, please Google them yourself
This book is intended as a guide for security professionals, developers, and
those interested in learning how elliptic curve cryptography can be deployed to secure
applications.