Cryptography: code making and code breaking

Compare Series: 
cryptographycodemakingandcodebreaking

White and black hat hackers

Readers learn the differences among white hat, black hat, and gray hat hackers and their ways of working concerning computer networks today.

Famous cryptographers

The stories of some of the individuals who have shaped cryptography are engagingly told in this narrative.

Digital era encryption and decryption

Today's news headlines are plentifully peppered by the latest hacks into some of the world's largest and most reputable companies.

Ciphers, codes, algorithms, and keys

Readers can anticipate an intriguing overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep peoples' information safe and secure.

The history of cryptography

Examines the history of cryptography, from encryption in Ancient Greece to the role it plays in our modern daily lives. Includes a glossary, resources for further information, and color photographs.

Uncracked codes and cyphers

2017
Looks at eight codes and ciphers throughout history that could not be solved.

Cyber attacks, counterattacks, and espionage

"In this ... book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime"--Amazon.com.
Subscribe to RSS - Cryptography: code making and code breaking