Muutke küpsiste eelistusi

E-raamat: Decrypted Secrets: Methods and Maxims of Cryptology

  • Formaat: PDF+DRM
  • Ilmumisaeg: 24-Nov-2006
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540481218
  • Formaat - PDF+DRM
  • Hind: 221,68 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 24-Nov-2006
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540481218

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.

Arvustused

"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)

From the reviews of the fourth edition:





"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)

"By far the best single work on the subject." -- David Kahn

It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century. (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010)

Muu info

4th edition
CryptographyThe People.- Introductory Synopsis.- Aims and Methods of
Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps:
Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.-
Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of
Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of
Methods.- Open Encryption Key Systems.- Encryption Security.-
CryptanalysisThe Machinery.- Exhausting Combinatorial Complexity.- Anatomy
of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of
Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment
of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.-
Anagramming.- Concluding Remarks.