Record Details

Catalog Search

Search Results Showing Item 1 of 1

Available copies

  • 1 of 1 copy available at Kirtland Community College.

Current holds

0 current holds with 1 total copy.

Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Kirtland Community College Library QA 76.9 .A25 B384 2013 30775305471808 General Collection Available -

Record details

  • ISBN: 9781466561861 (hardback)
  • ISBN: 1466561866 (hardback)
  • Physical Description: print
    xxv, 594 pages : illustrations ; 24 cm.
  • Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2013]

Content descriptions

Bibliography, etc. Note: Includes bibliographical references and index.
Formatted Contents Note: Ancient Roots -- Monalphabetic Substitution Ciphers, or MASCs: Disguises for Messages -- Simple progression to an unbreakable cipher -- Transposition Ciphers -- Shakespeare, Jefferson, and JFK -- World War I and Herbert O. Yardley -- Matrix Encryption -- World War II: The Enigma of Germany -- Cryptologic War against Japan -- Claude Shannon -- National Security Agency -- Data Encryption Standard -- Birth of Public Key Cryptography -- Attacking RSA -- Primality Testing and Complexity Theory -- Authenticity -- Pretty Good Privacy -- Stream Ciphers -- Suite B All-Stars -- Possible Futures.
Summary, etc.: "Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--
Subject: Data encryption (Computer science)
Computer security
Cryptography History
Search Results Showing Item 1 of 1

Additional Resources