Amazon cover image
Image from Amazon.com

Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.

By: Contributor(s): Material type: TextTextPublisher: Chichester ; Hoboken, NJ : John Wiley & Sons, 2007Description: xiii, 540 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780470060643
  • 0470060646
Subject(s): DDC classification:
  • 005.82 WO.C 2007 G.C 23
LOC classification:
  • QA76.9.A25 W62 2007
Contents:
Cryptology from the romans to World War II -- Cryptanalysis in detail -- Development milestones -- Life after DES -- Cryptographic protocols -- Practical applications -- Cryptology, politics, and business.
Summary: "Cryptography Unlocked introduces cryptography in a unique and non-mathematical style. Reinhard Wobst explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This book will reveal some of the dangers of code breaking, and highlights ways to master code breaking and attack algorithms."--Jacket.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.82 WO.C 2007 G.C (Browse shelf(Opens below)) Available 191609

"First published in the German language under the title "Abenteuer Kryptologie" by Addison-Wesley"--Title page verso.

Includes bibliographical references (pages 515-526) and index.

Cryptology from the romans to World War II -- Cryptanalysis in detail -- Development milestones -- Life after DES -- Cryptographic protocols -- Practical applications -- Cryptology, politics, and business.

"Cryptography Unlocked introduces cryptography in a unique and non-mathematical style. Reinhard Wobst explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This book will reveal some of the dangers of code breaking, and highlights ways to master code breaking and attack algorithms."--Jacket.

There are no comments on this title.

to post a comment.