Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

History of Cryptography and Cryptanalysis

Codes, Ciphers, and Their Algorithms - Previously published in hardcover
BuchKartoniert, Paperback
303 Seiten
Englisch
Springererschienen am21.12.2018Softcover reprint of the original 1st ed. 2018
concludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, and the Kryptos sculpture.This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security.mehr
Verfügbare Formate
BuchGebunden
EUR42,79
BuchKartoniert, Paperback
EUR42,79

Produkt

Klappentextconcludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, and the Kryptos sculpture.This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security.
Details
ISBN/GTIN978-3-030-08016-7
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2018
Erscheinungsdatum21.12.2018
AuflageSoftcover reprint of the original 1st ed. 2018
Seiten303 Seiten
SpracheEnglisch
Gewicht662 g
IllustrationenXIV, 303 p. 99 illus., 38 illus. in color.
Artikel-Nr.47253177

Inhalt/Kritik

Inhaltsverzeichnis
Introduction: A Revolutionary Cipher.- Crypto Before 1500: A Bit of Magic.- The Black Chambers: 1500 - 1776.- Crypto Goes to War:  The American Revolution.- Crypto Goes to War: The American Civil War 1861 - 1865.- Crypto and the War to End All Wars: 1914 - 1919.- The Interwar Period: 1919 - 1941.- The Rise of the Machines: 1918 - 1941.- Battle Against the Machines: World War II 1939 - 1945.- The Machines Take Over: Computer Cryptography.- Alice and Bob and Whit and Martin: Public-Key Cryptography.- Web and Mobile Device Cryptology.- Cyber Weapons and Cyber Warfare.- Cryptology and the Internet of Things.- What is Next in Cryptology?.- Cipher Mysteries.mehr
Kritik
Selected by Choice magazine as an Outstanding Academic Title for 2019
"Dooley (emer., Knox College) provides an excellent overview of cryptographic devices and algorithms, starting with ancient Rome and up to WW II, and covering monoalphabetic ciphers, polyalphabetic substitutions, the Vigenére cipher, and cipher machines such as Enigma. ... This is a book that needs to be read!" (J. Johnson, Choice, Vol. 56 (10), June, 2019)
mehr

Schlagworte

Autor

John F. Dooley is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. His other publications include the popular Springer title Codes, Ciphers and Spies: Tales of Military Intelligence in World War I.