|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?
taylor_memorial
(2731)
Angemeldet als privater Verkäufer
Verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, finden daher keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.

F.L. Bauer BESCHRIEBENE GEHEIMNISSE: METHODEN UND MAXIMEN DER KRYPTOLOGIE hc 4. Aufl. 2007

US $60,01
Ca.CHF 50,26
oder Preisvorschlag
Artikelzustand:
Sehr gut
Tight, clean, flat, square book with bumped corners, head and tail. No jacket as issued. ... Mehr erfahrenÜber den Artikelzustand
Ganz entspannt. Kostenloser Versand & Rückversand.
Versand:
Kostenlos USPS Media MailTM.
Standort: Cuyahoga Falls, Ohio, USA
Lieferung:
Lieferung zwischen Mi, 21. Mai und Fr, 23. Mai nach 43230 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:126565870908

Artikelmerkmale

Artikelzustand
Sehr gut
Buch, das nicht neu aussieht und gelesen wurde, sich aber in einem hervorragenden Zustand befindet. Der Einband weist keine offensichtlichen Beschädigungen auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers. Alle Zustandsdefinitionen ansehenwird in neuem Fenster oder Tab geöffnet
Hinweise des Verkäufers
“Tight, clean, flat, square book with bumped corners, head and tail. No jacket as issued. ...
Binding
Hardcover
Weight
2 lbs
Product Group
Book
IsTextBook
Yes
ISBN
9783540245025

Über dieses Produkt

Product Identifiers

Publisher
Springer Berlin / Heidelberg
ISBN-10
3540245022
ISBN-13
9783540245025
eBay Product ID (ePID)
63732461

Product Key Features

Number of Pages
Xiv, 525 Pages
Language
English
Publication Name
Decrypted Secrets : Methods and Maxims of Cryptology
Subject
Information Theory, Communication Studies, Security / Cryptography, Number Theory
Publication Year
2006
Features
Revised
Type
Textbook
Subject Area
Mathematics, Computers, Language Arts & Disciplines
Author
Friedrich L. Bauer
Format
Hardcover

Dimensions

Item Height
0.4 in
Item Weight
35 Oz
Item Length
9.3 in
Item Width
6.1 in

Additional Product Features

Edition Number
4
Intended Audience
Scholarly & Professional
LCCN
2006-933429
Reviews
"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition) From the reviews of the fourth edition: "This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. ... This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. ... Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science ... has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. ... There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007) "By far the best single work on the subject." -- David Kahn "It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. ... The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. ... this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century." (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010), "The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)From the reviews of the fourth edition:"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. … This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. … Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science … has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. … There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)"By far the best single work on the subject." -- David Kahn
Dewey Edition
22
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Cryptography--The People.- Introductory Synopsis.- Aims and Methods of Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps: Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.- Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of Methods.- Open Encryption Key Systems.- Encryption Security.- Cryptanalysis--The Machinery.- Exhausting Combinatorial Complexity.- Anatomy of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.- Anagramming.- Concluding Remarks.
Edition Description
Revised edition
Synopsis
In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers., In today's extensively wired and unsafe world cryptology plays a vital role in guarding communication channels, databases, and software from unwanted intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The first part reviews secret codes and their uses - the foundations of cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, and gives particular advice on assessing methods. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal accounts from the history of cryptology, it will also interest general readers., The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership., Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. This 4th edition has again been revised and extended in many technical and biographical details.
LC Classification Number
QA268

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

taylor_memorial

99,6% positive Bewertungen7.0 Tsd. Artikel verkauft

Mitglied seit Mär 2015
Antwortet meist innerhalb 24 Stunden
Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
NO STOCK PHOTOS! We strive for accuracy in descriptions and SHOW WHAT WE SELL so there is no confusion: manufacturers change packaging, eBay change guidelines, but pictures do not lie. ASK FOR MORE if ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (2'780)

Alle Bewertungen
Positiv
Neutral
Negativ