Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology /
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).
Main Authors: | , |
---|---|
Format: | Texto biblioteca |
Language: | eng |
Published: |
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,
2002
|
Subjects: | Computer science., Data encryption (Computer science)., Coding theory., Computers and civilization., Applied mathematics., Engineering mathematics., Number theory., Computer Science., Data Encryption., Coding and Information Theory., Number Theory., Applications of Mathematics., Computers and Society., |
Online Access: | http://dx.doi.org/10.1007/978-3-662-04736-1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
KOHA-OAI-TEST:202502 |
---|---|
record_format |
koha |
spelling |
KOHA-OAI-TEST:2025022018-07-30T23:30:19ZDecrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / Bauer, Friedrich L. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,2002.engCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group).Computer science.Data encryption (Computer science).Coding theory.Computers and civilization.Applied mathematics.Engineering mathematics.Number theory.Computer Science.Data Encryption.Coding and Information Theory.Number Theory.Applications of Mathematics.Computers and Society.Springer eBookshttp://dx.doi.org/10.1007/978-3-662-04736-1URN:ISBN:9783662047361 |
institution |
COLPOS |
collection |
Koha |
country |
México |
countrycode |
MX |
component |
Bibliográfico |
access |
En linea En linea |
databasecode |
cat-colpos |
tag |
biblioteca |
region |
America del Norte |
libraryname |
Departamento de documentación y biblioteca de COLPOS |
language |
eng |
topic |
Computer science. Data encryption (Computer science). Coding theory. Computers and civilization. Applied mathematics. Engineering mathematics. Number theory. Computer Science. Data Encryption. Coding and Information Theory. Number Theory. Applications of Mathematics. Computers and Society. Computer science. Data encryption (Computer science). Coding theory. Computers and civilization. Applied mathematics. Engineering mathematics. Number theory. Computer Science. Data Encryption. Coding and Information Theory. Number Theory. Applications of Mathematics. Computers and Society. |
spellingShingle |
Computer science. Data encryption (Computer science). Coding theory. Computers and civilization. Applied mathematics. Engineering mathematics. Number theory. Computer Science. Data Encryption. Coding and Information Theory. Number Theory. Applications of Mathematics. Computers and Society. Computer science. Data encryption (Computer science). Coding theory. Computers and civilization. Applied mathematics. Engineering mathematics. Number theory. Computer Science. Data Encryption. Coding and Information Theory. Number Theory. Applications of Mathematics. Computers and Society. Bauer, Friedrich L. author. SpringerLink (Online service) Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / |
description |
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group). |
format |
Texto |
topic_facet |
Computer science. Data encryption (Computer science). Coding theory. Computers and civilization. Applied mathematics. Engineering mathematics. Number theory. Computer Science. Data Encryption. Coding and Information Theory. Number Theory. Applications of Mathematics. Computers and Society. |
author |
Bauer, Friedrich L. author. SpringerLink (Online service) |
author_facet |
Bauer, Friedrich L. author. SpringerLink (Online service) |
author_sort |
Bauer, Friedrich L. author. |
title |
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / |
title_short |
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / |
title_full |
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / |
title_fullStr |
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / |
title_full_unstemmed |
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / |
title_sort |
decrypted secrets [electronic resource] : methods and maxims of cryptology / |
publisher |
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, |
publishDate |
2002 |
url |
http://dx.doi.org/10.1007/978-3-662-04736-1 |
work_keys_str_mv |
AT bauerfriedrichlauthor decryptedsecretselectronicresourcemethodsandmaximsofcryptology AT springerlinkonlineservice decryptedsecretselectronicresourcemethodsandmaximsofcryptology |
_version_ |
1756267709599842304 |