Atnaujinkite slapukų nuostatas

El. knyga: Decrypted Secrets: Methods and Maxims of Cryptology

4.03/5 (35 ratings by Goodreads)
  • Formatas: PDF+DRM
  • Išleidimo metai: 24-Nov-2006
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783540481218
  • Formatas: PDF+DRM
  • Išleidimo metai: 24-Nov-2006
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783540481218

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.

Recenzijos

"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)

From the reviews of the fourth edition:





"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)

"By far the best single work on the subject." -- David Kahn

It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century. (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010)

Daugiau informacijos

4th edition
CryptographyThe People.- Introductory Synopsis.- Aims and Methods of
Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps:
Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.-
Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of
Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of
Methods.- Open Encryption Key Systems.- Encryption Security.-
CryptanalysisThe Machinery.- Exhausting Combinatorial Complexity.- Anatomy
of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of
Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment
of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.-
Anagramming.- Concluding Remarks.