42,79 €*
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics.
This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics.
John F. Dooley
is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. His other publications include the popular Springer title
Codes, Ciphers and Spies: Tales of Military Intelligence in World War I
.
Presents a unique combination of accessible cryptographic algorithms and history
Reviews famous unsolved cipher messages
Includes test cryptograms at the end of many of the chapters, with solutions provided
Includes supplementary material: [...]
Introduction: A Revolutionary Cipher.- Crypto Before 1500: A Bit of Magic.- The Black Chambers: 1500 - 1776.- Crypto Goes to War: The American Revolution.- Crypto Goes to War: The American Civil War 1861 - 1865.- Crypto and the War to End All Wars: 1914 - 1919.- The Interwar Period: 1919 - 1941.- The Rise of the Machines: 1918 - 1941.- Battle Against the Machines: World War II 1939 - 1945.- The Machines Take Over: Computer Cryptography.- Alice and Bob and Whit and Martin: Public-Key Cryptography.- Web and Mobile Device Cryptology.- Cyber Weapons and Cyber Warfare.- Cryptology and the Internet of Things.- What is Next in Cryptology?.- Cipher Mysteries.
Erscheinungsjahr: | 2018 |
---|---|
Genre: | Informatik, Mathematik, Medizin, Naturwissenschaften, Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | History of Computing |
Inhalt: |
xiv
303 S. 61 s/w Illustr. 38 farbige Illustr. 303 p. 99 illus. 38 illus. in color. |
ISBN-13: | 9783030080167 |
ISBN-10: | 3030080161 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Dooley, John F. |
Auflage: | Softcover reprint of the original 1st ed. 2018 |
Hersteller: |
Springer International Publishing
History of Computing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 155 x 17 mm |
Von/Mit: | John F. Dooley |
Erscheinungsdatum: | 21.12.2018 |
Gewicht: | 0,555 kg |
John F. Dooley
is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. His other publications include the popular Springer title
Codes, Ciphers and Spies: Tales of Military Intelligence in World War I
.
Presents a unique combination of accessible cryptographic algorithms and history
Reviews famous unsolved cipher messages
Includes test cryptograms at the end of many of the chapters, with solutions provided
Includes supplementary material: [...]
Introduction: A Revolutionary Cipher.- Crypto Before 1500: A Bit of Magic.- The Black Chambers: 1500 - 1776.- Crypto Goes to War: The American Revolution.- Crypto Goes to War: The American Civil War 1861 - 1865.- Crypto and the War to End All Wars: 1914 - 1919.- The Interwar Period: 1919 - 1941.- The Rise of the Machines: 1918 - 1941.- Battle Against the Machines: World War II 1939 - 1945.- The Machines Take Over: Computer Cryptography.- Alice and Bob and Whit and Martin: Public-Key Cryptography.- Web and Mobile Device Cryptology.- Cyber Weapons and Cyber Warfare.- Cryptology and the Internet of Things.- What is Next in Cryptology?.- Cipher Mysteries.
Erscheinungsjahr: | 2018 |
---|---|
Genre: | Informatik, Mathematik, Medizin, Naturwissenschaften, Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | History of Computing |
Inhalt: |
xiv
303 S. 61 s/w Illustr. 38 farbige Illustr. 303 p. 99 illus. 38 illus. in color. |
ISBN-13: | 9783030080167 |
ISBN-10: | 3030080161 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Dooley, John F. |
Auflage: | Softcover reprint of the original 1st ed. 2018 |
Hersteller: |
Springer International Publishing
History of Computing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 155 x 17 mm |
Von/Mit: | John F. Dooley |
Erscheinungsdatum: | 21.12.2018 |
Gewicht: | 0,555 kg |