Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
F. L. Bauer DECRIPTED SECRETS: METHODS AND MAXIMS OF CRYPTOLOGY hc 4th Ed 2007
US $54.01
ApproximatelyS$ 69.45
or Best Offer
Condition:
“Tight, clean, flat, square book with bumped corners, head and tail. No jacket as issued. ”... Read moreabout condition
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: Cuyahoga Falls, Ohio, United States
Delivery:
Estimated between Tue, 22 Jul and Sat, 26 Jul
Returns:
30 days return. Seller pays for return shipping.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:127203386757
Item specifics
- Condition
- Very Good
- Seller Notes
- Binding
- Hardcover
- Weight
- 2 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9783540245025
About this product
Product Identifiers
Publisher
Springer Berlin / Heidelberg
ISBN-10
3540245022
ISBN-13
9783540245025
eBay Product ID (ePID)
63732461
Product Key Features
Number of Pages
Xiv, 525 Pages
Publication Name
Decrypted Secrets : Methods and Maxims of Cryptology
Language
English
Publication Year
2006
Subject
Information Theory, Communication Studies, Security / Cryptography, Number Theory
Features
Revised
Type
Textbook
Subject Area
Mathematics, Computers, Language Arts & Disciplines
Format
Hardcover
Dimensions
Item Height
0.4 in
Item Weight
35 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Edition Number
4
Intended Audience
Scholarly & Professional
LCCN
2006-933429
Dewey Edition
22
Reviews
"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition) From the reviews of the fourth edition: "This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. ... This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. ... Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science ... has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. ... There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007) "By far the best single work on the subject." -- David Kahn "It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. ... The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. ... this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century." (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010), "The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)From the reviews of the fourth edition:"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. … This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. … Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science … has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. … There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)"By far the best single work on the subject." -- David Kahn
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Edition Description
Revised edition
Table Of Content
Cryptography--The People.- Introductory Synopsis.- Aims and Methods of Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps: Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.- Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of Methods.- Open Encryption Key Systems.- Encryption Security.- Cryptanalysis--The Machinery.- Exhausting Combinatorial Complexity.- Anatomy of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.- Anagramming.- Concluding Remarks.
Synopsis
In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers., In today's extensively wired and unsafe world cryptology plays a vital role in guarding communication channels, databases, and software from unwanted intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The first part reviews secret codes and their uses - the foundations of cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, and gives particular advice on assessing methods. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal accounts from the history of cryptology, it will also interest general readers., The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership., Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. This 4th edition has again been revised and extended in many technical and biographical details.
LC Classification Number
QA268
Item description from the seller
Seller feedback (2,818)
- i***x (305)- Feedback left by buyer.Past monthVerified purchaseThanks
- i***x (305)- Feedback left by buyer.Past monthVerified purchaseGreat value… thank you
- i***x (305)- Feedback left by buyer.Past monthVerified purchaseThank you