logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

Secret History: The Story of Cryptology by Craig P. Bauer instant download

  • SKU: EBN-237354392
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Secret History: The Story of Cryptology after payment.
Authors:Craig P. Bauer
Pages:updating ...
Year:2021
Publisher:CRC Press
Language:english
File Size:22.02 MB
Format:epub
Categories: Ebooks

Product desciption

Secret History: The Story of Cryptology by Craig P. Bauer instant download

The first edition of this award-winning book attracted a wide audience. Secret History is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.
This new edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.
The first edition of this book contained chapters devoted to how German and Japanese systems from World War II were cracked. Now the other side of this cipher war is also told — how the United States was able to come up with systems that were never broken.
The presentation is in two parts. Part 1 presents classic cryptology from ancient times through World War II. Part 2 examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.
Features: Presents a chronological development of key concepts, Part 1 includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson's cipher wheel, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods. Part 2 looks at the work of Claude Shannon, the origin of the NSA, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography and many other topics. New chapters detail SIGABA and SIGSALY, successful systems used in WW II for text and speech, respectively. A final chapter includes quantum cryptography and the impact of quantum computers
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products

-20%

Zoey's Story by Bauer, Marion Dane instant download

4.9

9 reviews
$40 $32
-20%

(Ebook) The Rest of the Story by Tal Bauer ISBN B0BR1RLMCP

4.5

24 reviews
$40 $32