Chapman & Hall/CRC Cryptography and Network Security Series - Secret History Ebook Tooltip The Story of Cryptology

Afbeeldingen

Inkijkexemplaar

Artikel vergelijken

  • Engels
  • E-book
  • 9781351668491
  • 19 april 2021
  • Adobe ePub
Alle productspecificaties
  • Je leest ebooks gemakkelijk op je Kobo e-reader, of op je smartphone of tablet met de bol.com Kobo app. Let op! Ebooks kunnen niet geannuleerd of geretourneerd worden.

Samenvatting

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.

Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.

The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken.

The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.

FEATURES

  • Presents a chronological development of key concepts
  • Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods
  • Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics
  • New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively
  • Includes quantum cryptography and the impact of quantum computers

Productspecificaties

Inhoud

Taal
en
Bindwijze
E-book
Oorspronkelijke releasedatum
19 april 2021
Ebook Formaat
Adobe ePub
Illustraties
Nee

Betrokkenen

Hoofdauteur
Craig Bauer
Hoofduitgeverij
Chapman and Hall/CRC

Lees mogelijkheden

Lees dit ebook op
Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)

Overige kenmerken

Editie
1
Studieboek
Nee

EAN

EAN
9781351668491

Je vindt dit artikel in

Boek, ebook of luisterboek?
Ebook
Taal
Engels
Beschikbaarheid
Leverbaar
Studieboek of algemeen
Studieboeken
Nog geen reviews

Kies gewenste uitvoering

Editie : 1

Prijsinformatie en bestellen

De prijs van dit product is 65 euro.
Direct beschikbaar
Verkoop door bol
  • E-book is direct beschikbaar na aankoop
  • E-books lezen is voordelig
  • Dag en nacht klantenservice
  • Veilig betalen
Houd er rekening mee dat je downloadartikelen niet kunt annuleren of retourneren. Bij nog niet verschenen producten kun je tot de verschijningsdatum annuleren.
Zie ook de retourvoorwaarden