Atjaunināt sīkdatņu piekrišanu

E-grāmata: Decrypted Secrets: Methods and Maxims of Cryptology

4.03/5 (35 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 24-Nov-2006
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540481218
  • Formāts - PDF+DRM
  • Cena: 213,54 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 24-Nov-2006
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540481218

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.

Recenzijas

"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)

From the reviews of the fourth edition:





"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)

"By far the best single work on the subject." -- David Kahn

It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century. (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010)

Papildus informācija

4th edition
CryptographyThe People.- Introductory Synopsis.- Aims and Methods of
Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps:
Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.-
Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of
Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of
Methods.- Open Encryption Key Systems.- Encryption Security.-
CryptanalysisThe Machinery.- Exhausting Combinatorial Complexity.- Anatomy
of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of
Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment
of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.-
Anagramming.- Concluding Remarks.