Decrypted Secrets: Methods and Maxims of Cryptology
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and n...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2002
|
Ausgabe: | 3rd ed. 2002 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group) |
Beschreibung: | 1 Online-Ressource (XII, 474 p. 198 illus., 2 illus. in color) |
ISBN: | 9783662047361 |
DOI: | 10.1007/978-3-662-04736-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064892 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9783662047361 |9 978-3-662-04736-1 | ||
024 | 7 | |a 10.1007/978-3-662-04736-1 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-662-04736-1 | ||
035 | |a (OCoLC)1227479948 | ||
035 | |a (DE-599)BVBBV047064892 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Bauer, Friedrich L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Decrypted Secrets |b Methods and Maxims of Cryptology |c by Friedrich L. Bauer |
250 | |a 3rd ed. 2002 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2002 | |
300 | |a 1 Online-Ressource (XII, 474 p. 198 illus., 2 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group) | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Number Theory | |
650 | 4 | |a Applications of Mathematics | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information theory | |
650 | 4 | |a Number theory | |
650 | 4 | |a Applied mathematics | |
650 | 4 | |a Engineering mathematics | |
650 | 4 | |a Computers and civilization | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783662047385 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783662047378 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783540426745 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-04736-1 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032472004 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-04736-1 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182063520153600 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bauer, Friedrich L. |
author_facet | Bauer, Friedrich L. |
author_role | aut |
author_sort | Bauer, Friedrich L. |
author_variant | f l b fl flb |
building | Verbundindex |
bvnumber | BV047064892 |
classification_rvk | SK 170 ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-662-04736-1 (OCoLC)1227479948 (DE-599)BVBBV047064892 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-662-04736-1 |
edition | 3rd ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03417nmm a2200601zc 4500</leader><controlfield tag="001">BV047064892</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662047361</subfield><subfield code="9">978-3-662-04736-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-04736-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-04736-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227479948</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064892</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bauer, Friedrich L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decrypted Secrets</subfield><subfield code="b">Methods and Maxims of Cryptology</subfield><subfield code="c">by Friedrich L. Bauer</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 474 p. 198 illus., 2 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications of Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applied mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662047385</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662047378</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540426745</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-04736-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032472004</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-04736-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064892 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:23Z |
indexdate | 2024-07-10T09:01:36Z |
institution | BVB |
isbn | 9783662047361 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032472004 |
oclc_num | 1227479948 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 474 p. 198 illus., 2 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
spelling | Bauer, Friedrich L. Verfasser aut Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer 3rd ed. 2002 Berlin, Heidelberg Springer Berlin Heidelberg 2002 1 Online-Ressource (XII, 474 p. 198 illus., 2 illus. in color) txt rdacontent c rdamedia cr rdacarrier Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group) Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Erscheint auch als Druck-Ausgabe 9783662047385 Erscheint auch als Druck-Ausgabe 9783662047378 Erscheint auch als Druck-Ausgabe 9783540426745 https://doi.org/10.1007/978-3-662-04736-1 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Bauer, Friedrich L. Decrypted Secrets Methods and Maxims of Cryptology Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Decrypted Secrets Methods and Maxims of Cryptology |
title_auth | Decrypted Secrets Methods and Maxims of Cryptology |
title_exact_search | Decrypted Secrets Methods and Maxims of Cryptology |
title_exact_search_txtP | Decrypted Secrets Methods and Maxims of Cryptology |
title_full | Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer |
title_fullStr | Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer |
title_full_unstemmed | Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer |
title_short | Decrypted Secrets |
title_sort | decrypted secrets methods and maxims of cryptology |
title_sub | Methods and Maxims of Cryptology |
topic | Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie |
url | https://doi.org/10.1007/978-3-662-04736-1 |
work_keys_str_mv | AT bauerfriedrichl decryptedsecretsmethodsandmaximsofcryptology |