This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Olaf Manz first worked as a research assistant and Heisenberg professor at the mathematical institutes of the universities of Mainz and Heidelberg. He then worked for many years at Siemens in IT product management and knows cryptography from the practical side. He is also the author of the book "Error-Correcting Codes", also published by Springer.
This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data that require protection. The focus is on the description of the historically and for practice important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.
The author Dr. Olaf Manz first worked as a research assistant and Heisenberg professor at the mathematical institutes of the universities of Mainz and Heidelberg. He then worked for many years at Siemens in IT product managementand knows cryptography from the practical side. He is also the author of the book "Error-Correcting Codes", also published by Springer.„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 63,72 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerEUR 5,78 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In English. Bestandsnummer des Verkäufers ria9783662660140_new
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Explains the most important attack strategies for cracking encryption proceduresExplains why mobile phone calls on modern mobile networks are largely tap-proofEncourages bank customers to rely confidently on online banking these days. Bestandsnummer des Verkäufers 668465890
Anzahl: Mehr als 20 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. Bestandsnummer des Verkäufers 18396029270
Anzahl: 1 verfügbar
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
PF. Zustand: New. Bestandsnummer des Verkäufers 6666-IUK-9783662660140
Anzahl: 10 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to 'crack' encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.Springer Spektrum in Springer Science + Business Media, Tiergartenstr. 15-17, 69121 Heidelberg 144 pp. Englisch. Bestandsnummer des Verkäufers 9783662660140
Anzahl: 2 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to 'crack' encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults. 144 pp. Englisch. Bestandsnummer des Verkäufers 9783662660140
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to 'crack' encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults. Bestandsnummer des Verkäufers 9783662660140
Anzahl: 1 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. Bestandsnummer des Verkäufers 26396029276
Anzahl: 1 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 401429123
Anzahl: 1 verfügbar
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Bestandsnummer des Verkäufers ABEJUNE24-379922
Anzahl: 1 verfügbar