000 | 01952cam a2200433 i 4500 | ||
---|---|---|---|
001 | 2012032455 | ||
003 | DLC | ||
005 | 20190729105038.0 | ||
008 | 121024s2013 flua b 001 0 eng | ||
010 | _a 2012032455 | ||
020 |
_a9781466561861 _qhardback |
||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
049 | _aEY8Z | ||
050 | 0 | 0 |
_aQA76.9.A25 _bB384 2013 |
082 | 0 | 0 |
_a005.8/2 _223 |
084 |
_aCOM083000 _aMAT000000 _aMAT036000 _2bisacsh |
||
100 | 1 | _aBauer, Craig P. | |
245 | 1 | 0 |
_aSecret history : _bthe story of cryptology / _cCraig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence. |
264 | 1 |
_aBoca Raton : _bCRC Press, Taylor & Francis Group, _c[2013] |
|
300 |
_axxv, 594 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
490 | 0 |
_aDiscrete mathematics and its applications ; _v76 |
|
520 |
_a"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"-- _cProvided by publisher. |
||
504 | _aIncludes bibliographical references and index. | ||
650 | 0 | _aData encryption (Computer science) | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aCryptography _xHistory. |
|
650 | 0 | _aCiphers. | |
650 | 7 |
_aCOMPUTERS / Security / Cryptography. _2bisacsh |
|
650 | 7 |
_aMATHEMATICS / General. _2bisacsh |
|
650 | 7 |
_aMATHEMATICS / Combinatorics. _2bisacsh |
|
948 | _au365934 | ||
949 |
_aQA76.9 .A25 B384 2013 _wLC _c1 _hEY8Z _i33039001313450 |
||
596 | _a1 | ||
903 | _a24717 | ||
999 |
_c24717 _d24717 |