PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Sprache: Englisch
Verlag: Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, 2022
ISBN 10: 3662660148 ISBN 13: 9783662660140
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 31,50
Anzahl: 1 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 29,07
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 24,74
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In English.
Zustand: New.
Sprache: Englisch
Verlag: Spektrum Akademischer Verlag Gmbh, 2022
ISBN 10: 3662660148 ISBN 13: 9783662660140
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 53,08
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 144 pages. 9.44x6.61x0.31 inches. In Stock.
EUR 28,44
Anzahl: 1 verfügbar
In den WarenkorbZustand: NEW.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2022
ISBN 10: 3662660148 ISBN 13: 9783662660140
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New. Explains the most important attack strategies for cracking encryption proceduresExplains why mobile phone calls on modern mobile networks are largely tap-proofEncourages bank customers to rely confidently on online banking these days.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to 'crack' encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.