Catalog Search Results
Author
Pub. Date
[2022]
Edition
[First edition].
Language
English
Formats
Description
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.
Author
Publisher
No Starch Press
Pub. Date
[2023]
Physical Desc
1 online resource
Language
English
Description
"Teaches how to break encrypted texts, whether by hand or using free computer tools. Covers specific cryptographic techniques and includes real-life examples of encrypted text, from modern postcards to nineteenth-century newspaper ads, telegrams, notes smuggled into prisons, and entire encrypted books"--
Author
Publisher
Dutton Children's Books
Pub. Date
[2009]
Edition
First edition.
Physical Desc
170 pages : illustrations ; 21 cm
Language
English
Description
From the ingenious ciphers of Italian princes to the spy books of the Civil War to the advanced techniques of the CIA, codes and code breaking have played important roles throughout history.
Author
Series
Publisher
McGraw-Hill Education
Pub. Date
©2013
Physical Desc
1 online resource (xviii, 300 pages) : illustrations
Language
English
Description
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics...
Publisher
ISTE, Ltd
Pub. Date
2022.
Physical Desc
1 online resource.
Language
English
Description
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by...
Author
Series
Publisher
DK Publishing
Pub. Date
[2002]
Edition
First American edition.
Physical Desc
96 pages : illustrations (some color) ; 21 cm.
Language
English
Description
Tells the story of code breaking, from ancient times to the present age of quantum science, including some of the most complicated codes and the people who cracked them.
34) Enigma: how the German machine cipher was broken, and how it was read by the Allies in World War Two
Author
Series
Publisher
University Publications of America
Pub. Date
[1984]
Physical Desc
xiv, 348 pages, 32 unnumbered pages of plates : illustrations ; 24 cm.
Language
English
Series
Publisher
IBM, International Technical Support Organization
Pub. Date
2004
Edition
1st ed.
Physical Desc
1 online resource (xii, 220 pages) : illustrations
Language
English
Description
The IBM z990 includes both standard cryptographic hardware and optional cryptographic features, to give flexibility and growth capability. IBM has a long history of providing hardware cryptographic solutions, from the development of Data Encryption Standard (DES) in the 1970's to delivering the only integrated cryptographic hardware in a server to achieve the US Government's highest FIPS 140-2 Level 4 rating for secure cryptographic hardware. This...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase