Books

10 results found
Title Authors Description OpenBook ID
An introduction to mathematical cryptography An introduction to mathematical cryptography Jeffrey Hoffstein This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics wh… OL13764896W
Ultra hush-hush Ultra hush-hush Stephen Shapiro,Tina Forrester Provides an inside look at some of the real-life deceptions that turned the tide of World War II, describing the creative strategies that were used by all sides during the war. OL19926244W
Number Theory Toward RSA Cryptography: in 10 Undergraduate Lectures (Discrete Mathematics) (Volume … Number Theory Toward RSA Cryptography: in 10 Undergraduate Lectures (Discrete Mathematics) (Volume … Dr. Mohamed Omar 53 pages ; 23 cm OL20122836W
Top secret Top secret Helen Huckle Les multiples techniques de codages de messages, du morse à l'encre invisible. OL24856085W
I spy I spy Diana Noonan The first story tells how spies hide secret messages. The second story tells how secret messages could be sent to a friend. OL2852955W
Break that code Break that code Sharon Dalgleish,Lisa Thompson Learn how codes have been used since ancient times, and how to use your skills to break some codes. OL28760090W
Théo et le code de Lascaux Théo et le code de Lascaux Didier Leterq Littérature jeunesse: Lascaux (France, grotte), enfants, enquêtes, courage, personnes disparues Théo est très inquiet : son grand-père n'a pas donné signe de vie depuis deux semaines. Marguerite, la… OL29237019W
Death by Exposure Death by Exposure PH,Kevin Spreekmeester,Eric Walters A body is found frozen in a glacier with a roll of film. Readers can use the photographs and information provided about latitude, longitude and codes to solve the mystery. OL516456W
Computer Security and Cryptography Computer Security and Cryptography Alan G. Konheim Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data securit… OL6335110W
Investigator's Guide to Steganography Investigator's Guide to Steganography Gregory Kipper Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incide… OL8637041W