Call Boomerang Books 1300 36 33 32

Get Latest Book News + FREE Shipping. Subscribe to the Boomerang Books Bulletin eNewsletter right now!

Description - Cryptology Unlocked by Reinhard Wobst

Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way. Join the cryptology adventure, and understand: The difference between good and bad algorithms Whether or not secret services can read all messages The real-world affect cryptography had on World War II The unspoken security risks behind digital mobile standards GSM and UMTS The everyday implications on digital signatures, PINs and online banking

Buy Cryptology Unlocked by Reinhard Wobst from Australia's Online Independent Bookstore, Boomerang Books.

Book Details

ISBN: 9780470060643
ISBN-10: 0470060646
Format: Paperback
(235mm x 190mm x 32mm)
Pages: 554
Imprint: John Wiley & Sons Ltd
Publisher: John Wiley and Sons Ltd
Publish Date: 6-Jul-2007
Country of Publication: United Kingdom

Book Reviews - Cryptology Unlocked by Reinhard Wobst

» Have you read this book? We'd like to know what you think about it - write a review about Cryptology Unlocked book by Reinhard Wobst and you'll earn 50c in Boomerang Bucks loyalty dollars (you must be a Boomerang Books Account Holder - it's free to sign up and there are great benefits!)

Write Review

Author Biography - Reinhard Wobst

Reinhard Wobst studied mathematics at Technical University of Dresden and obtained his PhD in the field of scholastic processes in 1980. He now works as an independent programmer for scientific and industrial applications in C/C++ as well as script languages. In 1980, he conducted his first experiments with cryptographic algorithms. This hobby has led to numerous articles discussing cryptography, through to security consulting and security software development. All this writing has resulted in this book, which is now in its third edition in the original German and is published here in English for the first time.