ISBN13: | 9783662660140 |
ISBN10: | 3662660148 |
Kötéstípus: | Puhakötés |
Terjedelem: | 134 oldal |
Méret: | 240x168 mm |
Súly: | 257 g |
Nyelv: | angol |
Illusztrációk: | 29 Illustrations, black & white; 28 Illustrations, color |
512 |
Alkalmazott matematika
A számítástudomány elmélete, a számítástechnika általában
További könyvek a matematika területén
Springer Yellow Sale
Alkalmazott matematika (karitatív célú kampány)
A számítástudomány elmélete, a számítástechnika általában (karitatív célú kampány)
További könyvek a matematika területén (karitatív célú kampány)
Springer Yellow Sale (karitatív célú kampány)
Encrypt, Sign, Attack
EUR 35.30
Kattintson ide a feliratkozáshoz
A Prosperónál jelenleg nincsen raktáron.
This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data that require protection. The focus is on the description of the historically and for practice important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.
The author Dr. Olaf Manz first worked as a research assistant and Heisenberg professor at the mathematical institutes of the universities of Mainz and Heidelberg. He then worked for many years at Siemens in IT product managementand knows cryptography from the practical side. He is also the author of the book "Error-Correcting Codes", also published by Springer.This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.