LDR
| 03404cam a2200625 i 4500 |
---|
001 | 39858 |
---|
003 | KCCL |
---|
005 | 20140717121726.0 |
---|
008 | 121024s2013 flua b 001 0 eng |
---|
010 | | . |
‡a 2012032455 |
---|
035 | | . |
‡a(OCoLC)ocn792876639 |
---|
040 | | . |
‡aDLC
‡beng
‡erda
‡cDLC
‡dYDX
‡dBTCTA
‡dOCLCO
‡dUKMGB
‡dYDXCP
‡dBWX
‡dCOO
‡dIAD
‡dJYJ
‡dNLGGC
‡dVP@
‡dOCLCF
‡dPUL
‡dZCU
‡dWEA
‡dET8 |
---|
015 | | . |
‡aGBB2C0147
‡2bnb |
---|
016 | 7 | . |
‡a016219704
‡2Uk |
---|
019 | | . |
‡a858862421 |
---|
020 | | . |
‡a9781466561861 (hardback) |
---|
020 | | . |
‡a1466561866 (hardback) |
---|
029 | 1 | . |
‡aAU@
‡b000050132764 |
---|
029 | 1 | . |
‡aNLGGC
‡b353099937 |
---|
029 | 1 | . |
‡aNZ1
‡b14945656 |
---|
035 | | . |
‡a(OCoLC)792876639
‡z(OCoLC)858862421 |
---|
042 | | . |
‡apcc |
---|
050 | 0 | 0. |
‡aQA76.9.A25
‡bB384 2013 |
---|
082 | 0 | 0. |
‡a005.8/2
‡223 |
---|
084 | | . |
‡aCOM083000
‡aMAT000000
‡aMAT036000
‡2bisacsh |
---|
084 | | . |
‡a54.62
‡2bcl |
---|
084 | | . |
‡a54.01
‡2bcl |
---|
049 | | . |
‡aET8A
‡c1 |
---|
100 | 1 | . |
‡aBauer, Craig P. |
---|
245 | 1 | 0. |
‡aSecret history :
‡bthe story of cryptology /
‡cCraig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence. |
---|
264 | | 1. |
‡aBoca Raton :
‡bCRC Press, Taylor & Francis Group,
‡c[2013] |
---|
300 | | . |
‡axxv, 594 pages :
‡billustrations ;
‡c24 cm. |
---|
336 | | . |
‡atext
‡2rdacontent |
---|
337 | | . |
‡aunmediated
‡2rdamedia |
---|
338 | | . |
‡avolume
‡2rdacarrier |
---|
490 | 1 | . |
‡aDiscrete mathematics and its applications ;
‡v76 |
---|
520 | | . |
‡a"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--
‡cProvided by publisher. |
---|
504 | | . |
‡aIncludes bibliographical references and index. |
---|
505 | 0 | 0. |
‡tAncient Roots --
‡tMonalphabetic Substitution Ciphers, or MASCs: Disguises for Messages --
‡tSimple progression to an unbreakable cipher --
‡tTransposition Ciphers --
‡tShakespeare, Jefferson, and JFK --
‡tWorld War I and Herbert O. Yardley --
‡tMatrix Encryption --
‡tWorld War II: The Enigma of Germany --
‡tCryptologic War against Japan --
‡tClaude Shannon --
‡tNational Security Agency --
‡tData Encryption Standard --
‡tBirth of Public Key Cryptography --
‡tAttacking RSA --
‡tPrimality Testing and Complexity Theory --
‡tAuthenticity --
‡tPretty Good Privacy --
‡tStream Ciphers --
‡tSuite B All-Stars --
‡tPossible Futures. |
---|
650 | | 0. |
‡aData encryption (Computer science) |
---|
650 | | 0. |
‡aComputer security. |
---|
650 | | 0. |
‡aCryptography
‡xHistory. |
---|
650 | | 0. |
‡aCiphers. |
---|
830 | | 0. |
‡aCRC Press series on discrete mathematics and its applications ;
‡v76. |
---|
938 | | . |
‡aBaker and Taylor
‡bBTCP
‡nBK0011121184 |
---|
938 | | . |
‡aYBP Library Services
‡bYANK
‡n8771346 |
---|
938 | | . |
‡aBlackwell Book Service
‡bBBUS
‡n8771346 |
---|
994 | | . |
‡aC0
‡bET8 |
---|
901 | | . |
‡aocn792876639
‡bOCoLC
‡c39858
‡tbiblio
‡soclc |
---|