Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Cryptology: Classical and Modern with Maplets (Chapman & Hall/CRC Cryptography..
US $22.00
ApproximatelyRM 93.35
Condition:
“Pictorial boards have minor shelf wear, rubbing corners bumped, binding tight, pages clean and ”... Read moreabout condition
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: Sarasota, Florida, United States
Delivery:
Estimated between Thu, 24 Jul and Tue, 29 Jul to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:167385133762
Item specifics
- Condition
- Very Good
- Seller Notes
- ISBN
- 9781439872413
About this product
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1439872414
ISBN-13
9781439872413
eBay Product ID (ePID)
99389856
Product Key Features
Number of Pages
548 Pages
Publication Name
Basic Cryptography : Classical and Modern with Maplets
Language
English
Publication Year
2012
Subject
Communication Studies, Security / Cryptography
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Series
Chapman and Hall/Crc Cryptography and Network Security Ser.
Format
Hardcover
Dimensions
Item Height
1.2 in
Item Weight
32.8 Oz
Item Length
9.6 in
Item Width
6.4 in
Additional Product Features
Intended Audience
College Audience
LCCN
2012-015647
Dewey Edition
23
Reviews
All told, the authors have done an admirable job of balancing the competing goals of producing a text that can be read by people with limited mathematics background, but at the same time is maintained at a college level. This is not "cryptology for dummies", watered down to the point of uselessness, but is instead a book that, though accessible, requires an appropriate amount of effort and thought on the part of the reader. ... This is a book that not only meets but exceeds its goal of being a suitable text for a course in cryptology for non-majors. It is highly recommended for anybody teaching such a course, and it certainly belongs in any good university library. --Mark Hunacek, MAA Reviews, September 2012, All told, the authors have done an admirable job of balancing the competing goals of producing a text that can be read by people with limited mathematics background, but at the same time is maintained at a college level. This is not "cryptology for dummies", watered down to the point of uselessness, but is instead a book that, though accessible, requires an appropriate amount of effort and thought on the part of the reader. … This is a book that not only meets but exceeds its goal of being a suitable text for a course in cryptology for non-majors. It is highly recommended for anybody teaching such a course, and it certainly belongs in any good university library. -Mark Hunacek, MAA Reviews, September 2012, All told, the authors have done an admirable job of balancing the competing goals of producing a text that can be read by people with limited mathematics background, but at the same time is maintained at a college level. This is not "cryptology for dummies", watered down to the point of uselessness, but is instead a book that, though accessible, requires an appropriate amount of effort and thought on the part of the reader. e This is a book that not only meets but exceeds its goal of being a suitable text for a course in cryptology for non-majors. It is highly recommended for anybody teaching such a course, and it certainly belongs in any good university library. e"Mark Hunacek, MAA Reviews, September 2012
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Introduction to Cryptology Basic Terminology Cryptology in Practice Why Study Cryptology? Substitution Ciphers Keyword Substitution Ciphers A Maplet for Substitution Ciphers Cryptanalysis of Substitution Ciphers A Maplet for Cryptanalysis of Substitution Ciphers Playfair Ciphers A Maplet for Playfair Ciphers Transposition Ciphers Columnar Transposition Ciphers A Maplet for Transposition Ciphers Cryptanalysis of Transposition Ciphers Maplets for Cryptanalysis of Transposition Ciphers ADFGX and ADFGVX Ciphers A Maplet for ADFGX and ADFGVX Ciphers The Enigma Machine and Navajo Code The Enigma Cipher Machine A Maplet for the Enigma Cipher Machine Combinatorics Cryptanalysis of the Enigma Cipher Machine The Navajo Code A Maplet for the Navajo Code Shift and Affine Ciphers Modular Arithmetic A Maplet for Modular Reduction Shift Ciphers A Maplet for Shift Ciphers Cryptanalysis of Shift Ciphers A Maplet for Cryptanalysis of Shift Ciphers Affine Ciphers A Maplet for Affine Ciphers Cryptanalysis of Affine Ciphers A Maplet for Cryptanalysis of Affine Ciphers Alberti and Vigen¿ Ciphers Alberti Ciphers A Maplet for Alberti Ciphers Vigen¿ Ciphers A Maplet for Vigen¿ Keyword Ciphers Probability The Friedman Test A Maplet for the Friedman Test The Kasiski Test A Maplet for the Kasiski Test Cryptanalysis of Vigen¿ Keyword Ciphers A Maplet for Cryptanalysis of Vigen¿ Keyword Ciphers Hill Ciphers Matrices A Maplet for Matrix Multiplication Hill Ciphers A Maplet for Hill Ciphers Cryptanalysis of Hill Ciphers A Maplet for Cryptanalysis of Hill Ciphers RSA Ciphers Introduction to Public-Key Ciphers Introduction to RSA Ciphers The Euclidean Algorithm Maplets for the Euclidean Algorithm Modular Exponentiation A Maplet for Modular Exponentiation ASCII RSA Ciphers Maplets for RSA Ciphers Cryptanalysis of RSA Ciphers A Maplet for Cryptanalysis of RSA Ciphers Primality Testing Integer Factorization The RSA Factoring Challenges ElGamal Ciphers The Diffie¿Hellman Key Exchange Maplets for the Diffie¿Hellman Key Exchange Discrete Logarithms A Maplet for Discrete Logarithms ElGamal Ciphers Maplets for ElGamal Ciphers Cryptanalysis of ElGamal Ciphers A Maplet for Cryptanalysis of ElGamal Ciphers The Advanced Encryption Standard Representations of Numbers A Maplet for Base Conversions Stream Ciphers A Maplet for Stream Ciphers AES Preliminaries AES Encryption AES Decryption A Maplet for AES Ciphers AES Security Message Authentication RSA Signatures Hash Functions RSA Signatures with Hashing Maplets for RSA Signatures The Man-in-the-Middle Attack A Maplet for the Man-in-the-Middle Attack Public-Key Infrastructures Maplets for X.509 Certificates Bibliography Hints or Answers to Selected Exercises Index
Synopsis
Easily Accessible to Students with Nontechnical Backgrounds In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, the book assumes minimal mathematical prerequisites and incorporates student-friendly Maplets throughout that provide practical examples of the techniques used. Technology Resource By using the Maplets, students can complete complicated tasks with relative ease. They can encrypt, decrypt, and cryptanalyze messages without the burden of understanding programming or computer syntax. The authors explain topics in detail first before introducing one or more Maplets. All Maplet material and exercises are given in separate, clearly labeled sections. Instructors can omit the Maplet sections without any loss of continuity and non-Maplet examples and exercises can be completed with, at most, a simple hand-held calculator. The Maplets are available for download at www.radford.edu/ npsigmon/cryptobook.html. A Gentle, Hands-On Introduction to Cryptology After introducing elementary methods and techniques, the text fully develops the Enigma cipher machine and Navajo code used during World War II, both of which are rarely found in cryptology textbooks. The authors then demonstrate mathematics in cryptology through monoalphabetic, polyalphabetic, and block ciphers. With a focus on public-key cryptography, the book describes RSA ciphers, the Diffie-Hellman key exchange, and ElGamal ciphers. It also explores current U.S. federal cryptographic standards, such as the AES, and explains how to authenticate messages via digital signatures, hash functions, and certificates., Easily Accessible to Students with Nontechnical Backgrounds In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, the book assumes minimal mathematical prerequisites and incorporates student-friendly Maplets throughout that provide practical examples of the techniques used. Technology Resource By using the Maplets, students can complete complicated tasks with relative ease. They can encrypt, decrypt, and cryptanalyze messages without the burden of understanding programming or computer syntax. The authors explain topics in detail first before introducing one or more Maplets. All Maplet material and exercises are given in separate, clearly labeled sections. Instructors can omit the Maplet sections without any loss of continuity and non-Maplet examples and exercises can be completed with, at most, a simple hand-held calculator. The Maplets are available for download at www.radford.edu/~npsigmon/cryptobook.html. A Gentle, Hands-On Introduction to Cryptology After introducing elementary methods and techniques, the text fully develops the Enigma cipher machine and Navajo code used during World War II, both of which are rarely found in cryptology textbooks. The authors then demonstrate mathematics in cryptology through monoalphabetic, polyalphabetic, and block ciphers. With a focus on public-key cryptography, the book describes RSA ciphers, the Diffie¿Hellman key exchange, and ElGamal ciphers. It also explores current U.S. federal cryptographic standards, such as the AES, and explains how to authenticate messages via digital signatures, hash functions, and certificates.
LC Classification Number
TK5102.94.K55 2012
Item description from the seller
Popular categories from this store
Seller feedback (5,156)
- n***j (873)- Feedback left by buyer.Past monthVerified purchaseItem as described 👍
- g***k (7)- Feedback left by buyer.Past monthVerified purchaseArrived on time! And the sellers description of the product was 100% accurate!
- h***a (778)- Feedback left by buyer.Past monthVerified purchaseFABULOUS BOOK! Packaged perfectly! Thank you so very much!
More to explore :
- Chapman Piloting,
- Modern Library Classics Antiquarian & Collectible Books,
- Dorothy Hall Fiction & Books,
- Modern Library Classics Original Antiquarian & Collectible Books,
- Modern Library Classics Hardcover Antiquarian & Collectible Books,
- Cloth Modern Library Classics Antiquarian & Collectible Books,
- Modernism World literature & Classics Fiction Fiction & Nonfiction Books,
- Modernism Fiction Modern & Contemporary Fiction & Books,
- Dorothy Hall Hardcover Books,
- Fiction Books & Dorothy Hall Fiction