Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.

By: Material type: TextTextPublication details: Chichester ; Hoboken, NJ : John Wiley & Sons, c2007.Description: xiii, 540 p. : ill. ; 24 cmISBN:
  • 9780470060643
Subject(s): DDC classification:
  • 005.82   22
Contents:
1. Introduction. 2. Cryptology from the Romans to World War II. 3. Cryptanalysis in Detail. 4. Development Milestones: DES, RSA. 5. Life After DES: New Methods, New Attacks. 6. Cryptographic Protocols. 7. Practical Applications. 8. Cryptology, Politics, and Business. Glossary. Appendix A.1. Sources of Information. Appendix A.2. Bibliography. Index.
Summary: Cryptology Unlocked introduces cryptography in a unique and non-mathematical style. Renowned security author, Reinhard Wobst explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Cryptology Unlocked contains everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 005.82 / WO.C 2007 (Browse shelf(Opens below)) 1 Available 000533
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
005.82 / MO.I 2007 Innovative cryptography / 005.82 RH.I / 2003 Internet security : 005.82 RH.I / 2003 Internet security : 005.82 / WO.C 2007 Cryptology unlocked / 005.82 YO.M / 2004 Malicious cryptography : 006 / ST.N 2010 Networked graphics : 006.3 / AD.A 2009 Artificial life models in hardware /

First published in the German language under the title "Abenteuer Kryptologie" by Addison-Wesley"--T.p. verso.

Includes bibliographical references (p. 515-526) and index.

1. Introduction. 2. Cryptology from the Romans to World War II. 3. Cryptanalysis in Detail. 4. Development Milestones: DES, RSA. 5. Life After DES: New Methods, New Attacks. 6. Cryptographic Protocols. 7. Practical Applications. 8. Cryptology, Politics, and Business. Glossary. Appendix A.1. Sources of Information. Appendix A.2. Bibliography. Index.

Cryptology Unlocked introduces cryptography in a unique and non-mathematical style. Renowned security author, Reinhard Wobst explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Cryptology Unlocked contains everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way.

1

There are no comments on this title.

to post a comment.