37,99 €
37,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
37,99 €
37,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
37,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
37,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: PDF

Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern…mehr

Produktbeschreibung
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way. Join the cryptology adventure, and understand: * The difference between good and bad algorithms * Whether or not secret services can read all messages * The real-world affect cryptography had on World War II * The unspoken security risks behind digital mobile standards GSM and UMTS * The everyday implications on digital signatures, PINs and online banking

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Reinhard Wobst studied mathematics at Technical University of Dresden and obtained his PhD in the field of scholastic processes in 1980. He now works as an independent programmer for scientific and industrial applications in C/C++ as well as script languages. In 1980, he conducted his first experiments with cryptographic algorithms. This hobby has led to numerous articles discussing cryptography, through to security consulting and security software development. All this writing has resulted in this book, which is now in its third edition in the original German and is published here in English for the first time.