Bild 1 von 1

Galerie
Bild 1 von 1

Kryptologie: Klassisch und Modern mit Maplets (Chapman & Hall/CRC Kryptographie..-
US $22,00
Ca.EUR 18,92
Artikelzustand:
“Pictorial boards have minor shelf wear, rubbing corners bumped, binding tight, pages clean and ”... Mehr erfahrenÜber den Artikelzustand
Sehr gut
Buch, das nicht neu aussieht und gelesen wurde, sich aber in einem hervorragenden Zustand befindet. Der Einband weist keine offensichtlichen Beschädigungen auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos USPS Media MailTM.
Standort: Sarasota, Florida, USA
Lieferung:
Lieferung zwischen Do, 24. Jul und Di, 29. Jul nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:167385133762
Artikelmerkmale
- Artikelzustand
- Sehr gut
- Hinweise des Verkäufers
- ISBN
- 9781439872413
Über dieses Produkt
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1439872414
ISBN-13
9781439872413
eBay Product ID (ePID)
99389856
Product Key Features
Number of Pages
548 Pages
Publication Name
Basic Cryptography : Classical and Modern with Maplets
Language
English
Publication Year
2012
Subject
Communication Studies, Security / Cryptography
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Series
Chapman and Hall/Crc Cryptography and Network Security Ser.
Format
Hardcover
Dimensions
Item Height
1.2 in
Item Weight
32.8 Oz
Item Length
9.6 in
Item Width
6.4 in
Additional Product Features
Intended Audience
College Audience
LCCN
2012-015647
Dewey Edition
23
Reviews
All told, the authors have done an admirable job of balancing the competing goals of producing a text that can be read by people with limited mathematics background, but at the same time is maintained at a college level. This is not "cryptology for dummies", watered down to the point of uselessness, but is instead a book that, though accessible, requires an appropriate amount of effort and thought on the part of the reader. ... This is a book that not only meets but exceeds its goal of being a suitable text for a course in cryptology for non-majors. It is highly recommended for anybody teaching such a course, and it certainly belongs in any good university library. --Mark Hunacek, MAA Reviews, September 2012, All told, the authors have done an admirable job of balancing the competing goals of producing a text that can be read by people with limited mathematics background, but at the same time is maintained at a college level. This is not "cryptology for dummies", watered down to the point of uselessness, but is instead a book that, though accessible, requires an appropriate amount of effort and thought on the part of the reader. … This is a book that not only meets but exceeds its goal of being a suitable text for a course in cryptology for non-majors. It is highly recommended for anybody teaching such a course, and it certainly belongs in any good university library. -Mark Hunacek, MAA Reviews, September 2012, All told, the authors have done an admirable job of balancing the competing goals of producing a text that can be read by people with limited mathematics background, but at the same time is maintained at a college level. This is not "cryptology for dummies", watered down to the point of uselessness, but is instead a book that, though accessible, requires an appropriate amount of effort and thought on the part of the reader. e This is a book that not only meets but exceeds its goal of being a suitable text for a course in cryptology for non-majors. It is highly recommended for anybody teaching such a course, and it certainly belongs in any good university library. e"Mark Hunacek, MAA Reviews, September 2012
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Introduction to Cryptology Basic Terminology Cryptology in Practice Why Study Cryptology? Substitution Ciphers Keyword Substitution Ciphers A Maplet for Substitution Ciphers Cryptanalysis of Substitution Ciphers A Maplet for Cryptanalysis of Substitution Ciphers Playfair Ciphers A Maplet for Playfair Ciphers Transposition Ciphers Columnar Transposition Ciphers A Maplet for Transposition Ciphers Cryptanalysis of Transposition Ciphers Maplets for Cryptanalysis of Transposition Ciphers ADFGX and ADFGVX Ciphers A Maplet for ADFGX and ADFGVX Ciphers The Enigma Machine and Navajo Code The Enigma Cipher Machine A Maplet for the Enigma Cipher Machine Combinatorics Cryptanalysis of the Enigma Cipher Machine The Navajo Code A Maplet for the Navajo Code Shift and Affine Ciphers Modular Arithmetic A Maplet for Modular Reduction Shift Ciphers A Maplet for Shift Ciphers Cryptanalysis of Shift Ciphers A Maplet for Cryptanalysis of Shift Ciphers Affine Ciphers A Maplet for Affine Ciphers Cryptanalysis of Affine Ciphers A Maplet for Cryptanalysis of Affine Ciphers Alberti and Vigen¿ Ciphers Alberti Ciphers A Maplet for Alberti Ciphers Vigen¿ Ciphers A Maplet for Vigen¿ Keyword Ciphers Probability The Friedman Test A Maplet for the Friedman Test The Kasiski Test A Maplet for the Kasiski Test Cryptanalysis of Vigen¿ Keyword Ciphers A Maplet for Cryptanalysis of Vigen¿ Keyword Ciphers Hill Ciphers Matrices A Maplet for Matrix Multiplication Hill Ciphers A Maplet for Hill Ciphers Cryptanalysis of Hill Ciphers A Maplet for Cryptanalysis of Hill Ciphers RSA Ciphers Introduction to Public-Key Ciphers Introduction to RSA Ciphers The Euclidean Algorithm Maplets for the Euclidean Algorithm Modular Exponentiation A Maplet for Modular Exponentiation ASCII RSA Ciphers Maplets for RSA Ciphers Cryptanalysis of RSA Ciphers A Maplet for Cryptanalysis of RSA Ciphers Primality Testing Integer Factorization The RSA Factoring Challenges ElGamal Ciphers The Diffie¿Hellman Key Exchange Maplets for the Diffie¿Hellman Key Exchange Discrete Logarithms A Maplet for Discrete Logarithms ElGamal Ciphers Maplets for ElGamal Ciphers Cryptanalysis of ElGamal Ciphers A Maplet for Cryptanalysis of ElGamal Ciphers The Advanced Encryption Standard Representations of Numbers A Maplet for Base Conversions Stream Ciphers A Maplet for Stream Ciphers AES Preliminaries AES Encryption AES Decryption A Maplet for AES Ciphers AES Security Message Authentication RSA Signatures Hash Functions RSA Signatures with Hashing Maplets for RSA Signatures The Man-in-the-Middle Attack A Maplet for the Man-in-the-Middle Attack Public-Key Infrastructures Maplets for X.509 Certificates Bibliography Hints or Answers to Selected Exercises Index
Synopsis
Easily Accessible to Students with Nontechnical Backgrounds In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, the book assumes minimal mathematical prerequisites and incorporates student-friendly Maplets throughout that provide practical examples of the techniques used. Technology Resource By using the Maplets, students can complete complicated tasks with relative ease. They can encrypt, decrypt, and cryptanalyze messages without the burden of understanding programming or computer syntax. The authors explain topics in detail first before introducing one or more Maplets. All Maplet material and exercises are given in separate, clearly labeled sections. Instructors can omit the Maplet sections without any loss of continuity and non-Maplet examples and exercises can be completed with, at most, a simple hand-held calculator. The Maplets are available for download at www.radford.edu/ npsigmon/cryptobook.html. A Gentle, Hands-On Introduction to Cryptology After introducing elementary methods and techniques, the text fully develops the Enigma cipher machine and Navajo code used during World War II, both of which are rarely found in cryptology textbooks. The authors then demonstrate mathematics in cryptology through monoalphabetic, polyalphabetic, and block ciphers. With a focus on public-key cryptography, the book describes RSA ciphers, the Diffie-Hellman key exchange, and ElGamal ciphers. It also explores current U.S. federal cryptographic standards, such as the AES, and explains how to authenticate messages via digital signatures, hash functions, and certificates., Easily Accessible to Students with Nontechnical Backgrounds In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, the book assumes minimal mathematical prerequisites and incorporates student-friendly Maplets throughout that provide practical examples of the techniques used. Technology Resource By using the Maplets, students can complete complicated tasks with relative ease. They can encrypt, decrypt, and cryptanalyze messages without the burden of understanding programming or computer syntax. The authors explain topics in detail first before introducing one or more Maplets. All Maplet material and exercises are given in separate, clearly labeled sections. Instructors can omit the Maplet sections without any loss of continuity and non-Maplet examples and exercises can be completed with, at most, a simple hand-held calculator. The Maplets are available for download at www.radford.edu/~npsigmon/cryptobook.html. A Gentle, Hands-On Introduction to Cryptology After introducing elementary methods and techniques, the text fully develops the Enigma cipher machine and Navajo code used during World War II, both of which are rarely found in cryptology textbooks. The authors then demonstrate mathematics in cryptology through monoalphabetic, polyalphabetic, and block ciphers. With a focus on public-key cryptography, the book describes RSA ciphers, the Diffie¿Hellman key exchange, and ElGamal ciphers. It also explores current U.S. federal cryptographic standards, such as the AES, and explains how to authenticate messages via digital signatures, hash functions, and certificates.
LC Classification Number
TK5102.94.K55 2012
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
Birkitt's Books
100% positive Bewertungen•10.347 Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Beliebte Kategorien in diesem Shop
Verkäuferbewertungen (5.155)
- 3***a (25)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufI had some concerns about mold (the book I purchased is out of print and old) and the seller was kind enough to check the book out for me. They were also reassuring of their return policy if there was any problem. The book arrived as expected and was packaged securely and thoroughly. Will purchase from this seller again!
- 8***c (98)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufExcellent communication, fast shipping, packaged very well, product as described. Good price! Highly recommended seller!!Bee Gees: To Whom It May Concern (Words, Music, Photographs) (Nr. 196957627052)
- m***n (422)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufPackage were shipped in a timely fashion. Product was as described. Communication is excellent. Packaging was wonderful. Value is very good. I would do business with this person again.The Book of the Roycrofters: Being a Catalog of Copper, Leather and Books: A.. (Nr. 196279603632)