| 000 | 01016camuu2200301 a 4500 | |
| 001 | 000045359244 | |
| 005 | 20070605103721 | |
| 008 | 060825s2007 gw a b 001 0 eng | |
| 010 | ▼a 2006933429 | |
| 020 | ▼a 9783540245025 (acid-free paper) | |
| 020 | ▼a 3540245022 (acd-free paper) | |
| 035 | ▼a (KERIS)REF000013061710 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
| 041 | 1 | ▼a eng ▼h ger |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b B38513 2007 |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b B3442eE4 | |
| 100 | 1 | ▼a Bauer, Friedrich Ludwig , ▼d 1924-. |
| 240 | 1 0 | ▼a Entzifferte Geheimnisse. ▼l English |
| 245 | 1 0 | ▼a Decrypted secrets : ▼b methods and maxims of cryptology / ▼c Friedrich L. Bauer. |
| 250 | ▼a 4th, rev. and extended ed. | |
| 260 | ▼a Berlin ; ▼a New York : ▼b Springer , ▼c c2007. | |
| 300 | ▼a xii, 524 p. : ▼b ill. ; ▼c 24 cm. | |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Cryptography. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 B3442eE4 | 등록번호 121147294 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.
The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.
In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
New feature
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection.The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
"Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details.
"The best single book on cryptology today" (David Kahn, Cryptologia)
"For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group)
정보제공 :
목차
Cryptography-The People.- Introductory Synopsis.- Aims and Methods of Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps: Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.- Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of Methods.- Open Encryption Key Systems.- Encryption Security.- Cryptanalysis-The Machinery.- Exhausting Combinatorial Complexity.- Anatomy of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.- Anagramming.- Concluding Remarks.
정보제공 :
