MARC보기
LDR03659cam a2200589Mi 4500
001000000411763
00520190131142548
006m d
007cr |n|||||||||
008160405s2017 njua ob 001 0 eng d
019 ▼a 967393172 ▼a 971594292 ▼a 971914236 ▼a 972138720 ▼a 972289002 ▼a 972426978 ▼a 972573030 ▼a 972743122 ▼a 973896979 ▼a 974034290
020 ▼a 1400885620 ▼q (ebk)
020 ▼a 9781400885626
020 ▼z 0691141754
020 ▼z 9780691141756
035 ▼a 1434820 ▼b (N$T)
035 ▼a (OCoLC)972159290 ▼z (OCoLC)967393172 ▼z (OCoLC)971594292 ▼z (OCoLC)971914236 ▼z (OCoLC)972138720 ▼z (OCoLC)972289002 ▼z (OCoLC)972426978 ▼z (OCoLC)972573030 ▼z (OCoLC)972743122 ▼z (OCoLC)973896979 ▼z (OCoLC)974034290
037 ▼a 984633 ▼b MIL
040 ▼a IDEBK ▼b eng ▼e rda ▼e pn ▼c IDEBK ▼d OCLCO ▼d OCLCQ ▼d YDX ▼d N$T ▼d EBLCP ▼d MERUC ▼d IDEBK ▼d 247004
050 4 ▼a Z103 ▼b .H664 2017eb
072 7 ▼a COM ▼x 083000 ▼2 bisacsh
08204 ▼a 005.8/2 ▼2 23
1001 ▼a Holden, Joshua, ▼d 1970- ▼e author.
24514 ▼a The mathematics of secrets : ▼b cryptography from Caesar ciphers to digital encryption/ ▼c Joshua Holden.
260 ▼a Princeton: ▼b Princeton University Press, ▼c [2017].
300 ▼a 1 online resource (xiv, 373 pages): ▼b illustrations.
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
504 ▼a Includes bibliographical references and index.
520 ▼a "The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book." -- adapted from jacket flap.
5880 ▼a Print version record.
590 ▼a Master record variable field(s) change: 072 - OCLC control number change
650 0 ▼a Cryptography ▼x Mathematics.
650 0 ▼a Ciphers.
650 0 ▼a Computer security.
650 7 ▼a Ciphers. ▼2 fast ▼0 (OCoLC)fst00861549
650 7 ▼a Computer security. ▼2 fast ▼0 (OCoLC)fst00872484
650 7 ▼a Cryptography ▼x Mathematics. ▼2 fast ▼0 (OCoLC)fst00884558
650 7 ▼a COMPUTERS / Security / Cryptography ▼2 bisacsh
650 1 ▼a Ciphers.
655 4 ▼a Electronic books.
655 0 ▼a Electronic books.
77608 ▼i Print version: ▼z 9781400885626
85640 ▼3 EBSCOhost ▼u http://libproxy.dhu.ac.kr/_Lib_Proxy_Url/http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1434820
938 ▼a Ingram Digital eBook Collection ▼b IDEB ▼n cis37130418
938 ▼a YBP Library Services ▼b YANK ▼n 13415256
938 ▼a EBSCOhost ▼b EBSC ▼n 1434820
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL4797326
990 ▼a ***1012033
994 ▼a 92 ▼b N$T