Sold Out
Book Categories |
Preface.
1. Introduction.
2. Cryptology from the Romans to World War II.
3. Cryptanalysis in Detail.
4. Development Milestones: DES, RSA.
5. Life After DES: New Methods, New Attacks.
6. Cryptographic Protocols.
7. Practical Applications.
8. Cryptology, Politics, and Business.
Glossary.
Appendix A.1. Sources of Information.
Appendix A.2. Bibliography.
Index.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionCryptology Unlocked
X
This Item is in Your InventoryCryptology Unlocked
X
You must be logged in to review the productsX
X
X
Add Cryptology Unlocked, Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explain, Cryptology Unlocked to the inventory that you are selling on WonderClubX
X
Add Cryptology Unlocked, Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explain, Cryptology Unlocked to your collection on WonderClub |