undrgrnd Cliquez ici ValentinB nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici nav_HPTV Cliquez ici Acheter Fire Acheter Kindle Paperwhite cliquez_ici Jeux Vidéo Montres soldes Bijoux Soldes
Commencez à lire Cryptography: A Very Short Introduction sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible
 

Cryptography: A Very Short Introduction [Format Kindle]

Sean Murphy , Fred Piper
2.5 étoiles sur 5  Voir tous les commentaires (2 commentaires client)

Prix conseillé : EUR 9,06 De quoi s'agit-il ?
Prix livre imprimé : EUR 11,01
Prix Kindle : EUR 6,34 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 4,67 (42%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 6,34  
Broché EUR 7,13  
-40%, -50%, -60%, -70%... Découvrez les Soldes Amazon jusqu'au 16 février 2016 inclus. Profitez-en !





Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Revue de presse

a perfect pocket primer for anybody interested in cryptography. (Simon Singh)

Présentation de l'éditeur

This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact
of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.

ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 1023 KB
  • Nombre de pages de l'édition imprimée : 160 pages
  • Editeur : Oxford Paperbacks; Édition : 1st (30 mai 2002)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ISBN-10: 0192803158
  • ISBN-13: 978-0192803153
  • ASIN: B000SGSYCC
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Activé
  • Moyenne des commentaires client : 2.5 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
  • Classement des meilleures ventes d'Amazon: n°372.401 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

5 étoiles
0
4 étoiles
0
1 étoiles
0
2.5 étoiles sur 5
2.5 étoiles sur 5
Meilleurs commentaires des clients
3.0 étoiles sur 5 c'est cher pour ce que c'est !!! 25 novembre 2014
Format:Broché|Achat vérifié
Comme disait Bernard Shaw "Le chemin de l'ignorance est pavé de bonnes editions" . Je ne recommande pas, ce livre à un étudiant
Avez-vous trouvé ce commentaire utile ?
Signaler un abus
2.0 étoiles sur 5 Assez confus 16 février 2014
Format:Format Kindle|Achat vérifié
Pas super comme livre avec pas mal d'aller / retour, peu d'homogénéité, pas super lisible ni super instructif j'ai trouvé.
Avez-vous trouvé ce commentaire utile ?
Signaler un abus
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.5 étoiles sur 5  18 commentaires
20 internautes sur 20 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 excellent read 26 novembre 2008
Par Brian R. Goulet - Publié sur Amazon.com
this book is exactly what it says it is and is excellent at that task. i highly recommend this book to a sys-admin that wants to understand the basics of encryption without being an expert, anyone interested in cryptograms, or anyone with just a casual interest in the history, and concepts of cryptography.

this book is not designed for mathematicians or security experts looking deep inner workings of algorithms.

the book is easy to follow without the need for a technical or mathematics background and gives occasional problems for the reader to solve which will be of interest to anyone who enjoys cryptograms.

as a network engineer, i found this an enjoyable pleasure read which shed some light on the encryption protocols employed on some of the gear i manage.
24 internautes sur 26 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 covers the main ideas, with little maths needed 11 octobre 2005
Par W Boudville - Publié sur Amazon.com
Format:Broché
The book is good as befits its subtitle. Indeed, a very short introduction, with only a minimal evocation of maths background. But there is enough qualitative explanation so that you can understand the broad historical development. From the Caesar Cipher to a Simple Substitution Cipher to a Vigenere Square Cipher. Then, the text goes into modern ideas, all of which involve using computers to encrypt and decrypt. Notably the invention of the public key system. Truly quite different from all that preceded it.

There is also a brief foray into quantum computing. Here, it is mostly conceptual; discussing the possible potential, since current implementations are very rudimentary. The text has no mention of man in the middle attacks and how to guard against these. Pity. Because while this is a very hard attack to perform, if it can done, then it is very hard to defend against. One of the promises of quantum computing is that it inherently offers a simple detection, based on quantum interference by the attacker.
4 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 I needed a quick summary, and this was perfect 25 octobre 2013
Par E - Publié sur Amazon.com
Format:Broché|Achat vérifié
I was surprised that the booklet goes into the history of cryptography, but it's relatively thorough. Great resource if you need a quick, accurate, and complete review of the subject for people who aren't cryptologists or cryptographers.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Short, but good 5 juin 2015
Par Jonathan Baumgardner - Publié sur Amazon.com
Format:Broché|Achat vérifié
Be aware that there are multiple errors on page 30, so don't get flustered and give up. It's a practice exercise, and a fun one, but if you get stumped, just use some ingenuity and keep moving through. I did a quick skim afterward for an answer key and a "surprise, we threw in some errors!", but didn't find it. So, if you think you're solving it and then a wrench gets thrown into the gears, just keep going and assume that it's one of the errors. With Kryptos, there are both intentional and accidental errors, so I just assumed each one was an error after I checked my own deduction, and kept going. Sure enough, things made sense, but there are "typos", so don't let that stop you. I was doing it in my head, so I got very frustrated having to second-guess myself, thinking that I made a mistake, because I DID make one letter mistake which I caught when it made its second appearance, before any of the errors were against me. Not having anything on paper, realizing a mistake that I made, and then coming across more mistakes which I couldn't blame on myself and correct was very frustrating and confusing. Do it on paper and laugh at the sloppy mistakes, or do it in your head and know that you don't have to quadruple-check that it's not your own fault. Check once, know that they messed up, and don't let it ruin the fun...it almost ruined my fun. ...And that's how I spent my Thursday night without a girlfriend anymore.

I'm not new to the idea of encryption since my background is in IT, but I wanted to do some serious learning and start from the ground floor to better understand the algorithms in practice. This book is the first of three I'm reading to correct any misunderstandings I may have had, and it's an easy and good read so far. I haven't finished it yet (I often get bored and skim, then move to a new book), but I may as well warn others of page 30 in the event I don't update my review. Good starter book. I'm glad I got it.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent for a beginer 29 novembre 2012
Par Marco - Publié sur Amazon.com
Format:Broché|Achat vérifié
This is for the ones entering into security practice
It is short and accurate if security is for you with this book youll discover it.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique