Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).

Saved in:
Bibliographic Details
Main Authors: Bauer, Friedrich L. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002
Subjects:Computer science., Data encryption (Computer science)., Coding theory., Computers and civilization., Applied mathematics., Engineering mathematics., Number theory., Computer Science., Data Encryption., Coding and Information Theory., Number Theory., Applications of Mathematics., Computers and Society.,
Online Access:http://dx.doi.org/10.1007/978-3-662-04736-1
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:202502
record_format koha
spelling KOHA-OAI-TEST:2025022018-07-30T23:30:19ZDecrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / Bauer, Friedrich L. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,2002.engCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).Computer science.Data encryption (Computer science).Coding theory.Computers and civilization.Applied mathematics.Engineering mathematics.Number theory.Computer Science.Data Encryption.Coding and Information Theory.Number Theory.Applications of Mathematics.Computers and Society.Springer eBookshttp://dx.doi.org/10.1007/978-3-662-04736-1URN:ISBN:9783662047361
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Data encryption (Computer science).
Coding theory.
Computers and civilization.
Applied mathematics.
Engineering mathematics.
Number theory.
Computer Science.
Data Encryption.
Coding and Information Theory.
Number Theory.
Applications of Mathematics.
Computers and Society.
Computer science.
Data encryption (Computer science).
Coding theory.
Computers and civilization.
Applied mathematics.
Engineering mathematics.
Number theory.
Computer Science.
Data Encryption.
Coding and Information Theory.
Number Theory.
Applications of Mathematics.
Computers and Society.
spellingShingle Computer science.
Data encryption (Computer science).
Coding theory.
Computers and civilization.
Applied mathematics.
Engineering mathematics.
Number theory.
Computer Science.
Data Encryption.
Coding and Information Theory.
Number Theory.
Applications of Mathematics.
Computers and Society.
Computer science.
Data encryption (Computer science).
Coding theory.
Computers and civilization.
Applied mathematics.
Engineering mathematics.
Number theory.
Computer Science.
Data Encryption.
Coding and Information Theory.
Number Theory.
Applications of Mathematics.
Computers and Society.
Bauer, Friedrich L. author.
SpringerLink (Online service)
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
description Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).
format Texto
topic_facet Computer science.
Data encryption (Computer science).
Coding theory.
Computers and civilization.
Applied mathematics.
Engineering mathematics.
Number theory.
Computer Science.
Data Encryption.
Coding and Information Theory.
Number Theory.
Applications of Mathematics.
Computers and Society.
author Bauer, Friedrich L. author.
SpringerLink (Online service)
author_facet Bauer, Friedrich L. author.
SpringerLink (Online service)
author_sort Bauer, Friedrich L. author.
title Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
title_short Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
title_full Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
title_fullStr Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
title_full_unstemmed Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
title_sort decrypted secrets [electronic resource] : methods and maxims of cryptology /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,
publishDate 2002
url http://dx.doi.org/10.1007/978-3-662-04736-1
work_keys_str_mv AT bauerfriedrichlauthor decryptedsecretselectronicresourcemethodsandmaximsofcryptology
AT springerlinkonlineservice decryptedsecretselectronicresourcemethodsandmaximsofcryptology
_version_ 1756267709599842304