|
|
The Templar Code For Dummies
A captivating look into the society of the Knights Templar
Brought to you by the author of Freemasons For Dummies, The Templar Code is more than an intriguing cipher or a mysterious symbol – it is the Code by which the Knights Templar lived and died, the Code that bound them together in secrecy, and the Code... | | CryptanalysisThorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.... | | The Code Book: How to Make It, Break It, Hack It, Crack ItIt’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,... |
|
Windows 7 Annoyances: Tips, Secrets, and Solutions
They say no one should see how sausage or laws get made, and I feel the same
is true for software.
Imagine a windowless room in a nondescript office building. Inoffensive tan carpet lines the floors, fluorescent lights hum softly overhead, and 20 seated Microsoft employees flank a rectangular folding table in the center of... | | The Da Vinci Code
While in Paris on business, Harvard symbologist Robert Langdon receives an urgent late-night phone call: the elderly curator of the Louvre has been murdered inside the museum. Near the body, police have found a baffling cipher. While working to solve the enigmatic riddle, Langdon is stunned to discover it leads to a trail of clues hidden in... | | Information Security and Cryptology: 5th International Conference, Inscrypt 2009
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are... |
|
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a... | | Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... | | Cryptography and Network Security: Principles and Practice (5th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |
|
|
Result Page: 3 2 1 |