Java Diliyle Kriptoloji Uygulamaları
%25
4,04 USD
5,38 USD
Stock code
9786059129411
Number of pages
320
The aspect
16.5 / 24cm
Isbn
9786059129411
Author
Hüseyin Bodur
Warranty Period
24 Month
Price
5,38 USD
Cryptology from the Past to the Future!
In this book, the development of the field of cryptology in the historical process is explained. Many methods used in this field from thousands of years ago to the present day have been examined and the algorithm structures of these methods have been tried to be mentioned. In its simplest form, cryptography can be divided into two sub-fields, cryptography and cryptanalysis. The field of cryptography includes all of the techniques that make information incomprehensible, while the field of cryptanalysis includes techniques that aim to extract meaningful information from a meaningless text.
At this point, the book has given more weight to the field of cryptography compared to the field of cryptanalysis. Many of the methods described in it are part of the field of cryptography.
The book is for those who are curious about the field of encryption and want to have information about how encryption and decryption processes are done with different algorithms from past to present.
It is also a resource for software developers who want to have practical knowledge as well as theoretical knowledge about data security. The methods in it have been tried to be explained using a plain language as much as possible.
At this point, the book has given more weight to the field of cryptography compared to the field of cryptanalysis. Many of the methods described in it are part of the field of cryptography.
The book is for those who are curious about the field of encryption and want to have information about how encryption and decryption processes are done with different algorithms from past to present.
It is also a resource for software developers who want to have practical knowledge as well as theoretical knowledge about data security. The methods in it have been tried to be explained using a plain language as much as possible.
INGREDIENTS
Encryption Methods in History
Private Key Encryption Methods
Public Key Encryption Methods
SMS Encryption Application
Cryptanalysis Methods
The Future of Cryptology
Affine Encryption Method
AES Encryption Method
DES Encryption Method
Elliptic Curve Encryption
Cryptanalysis Methods
History of Cryptology
Quantum Key Distribution
Quantum Encryption
Permutation Encryption Method
RSA Encryption
SHA-3
Vernam Encryption Method
Encryption Methods in History
Private Key Encryption Methods
Public Key Encryption Methods
SMS Encryption Application
Cryptanalysis Methods
The Future of Cryptology
Affine Encryption Method
AES Encryption Method
DES Encryption Method
Elliptic Curve Encryption
Cryptanalysis Methods
History of Cryptology
Quantum Key Distribution
Quantum Encryption
Permutation Encryption Method
RSA Encryption
SHA-3
Vernam Encryption Method
Be the first to review this product!
RECOMMENDED PRODUCTS