000845821 000__ 02375cam\a2200469Ii\4500 000845821 001__ 845821 000845821 005__ 20230306145039.0 000845821 006__ m\\\\\o\\d\\\\\\\\ 000845821 007__ cr\cn\nnnunnun 000845821 008__ 180829s2018\\\\sz\a\\\\ob\\\\001\0\eng\d 000845821 019__ $$a1050651463 000845821 020__ $$a9783319904436$$q(electronic book) 000845821 020__ $$a3319904434$$q(electronic book) 000845821 020__ $$z9783319904429 000845821 020__ $$z3319904426 000845821 0247_ $$a10.1007/978-3-319-90443-6$$2doi 000845821 035__ $$aSP(OCoLC)on1050163804 000845821 035__ $$aSP(OCoLC)1050163804$$z(OCoLC)1050651463 000845821 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dNLE$$dUAB 000845821 049__ $$aISEA 000845821 050_4 $$aZ103 000845821 08204 $$a652/.8$$223 000845821 1001_ $$aDooley, John,$$d1952-$$eauthor. 000845821 24510 $$aHistory of cryptography and cryptanalysis :$$bcodes, ciphers, and their algorithms /$$cJohn F. Dooley. 000845821 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000845821 300__ $$a1 online resource (xiv, 303 pages) :$$billustrations. 000845821 336__ $$atext$$btxt$$2rdacontent 000845821 337__ $$acomputer$$bc$$2rdamedia 000845821 338__ $$aonline resource$$bcr$$2rdacarrier 000845821 4901_ $$aHistory of computing,$$x2190-6831 000845821 504__ $$aIncludes bibliographical references and index. 000845821 5050_ $$aIntroduction: A Revolutionary Cipher Crypto Before 1500: A Bit of Magic The Black Chambers: 1500 -1776 Crypto Goes to War: The American Revolution Crypto Goes to War: The American Civil War 1861-1865 Crypto and the War to End All Wars: 1914-1919 The Interwar Period: 1919-1941 The Rise of the Machines: 1918-1941 Battle Against the Machines: World War II 1939-1945 The Machines Take Over: Computer Cryptography Alice and Bob and Whit and Martin: Public-Key Cryptography Web and Mobile Device Cryptology Cyber Weapons and Cyber Warfare Cryptology and the Internet of Things What is Next in Cryptology? Cipher Mysteries. 000845821 506__ $$aAccess limited to authorized users. 000845821 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 29, 2018). 000845821 650_0 $$aCryptography$$xHistory. 000845821 650_0 $$aData encryption (Computer science)$$xHistory. 000845821 77608 $$iPrint version: $$z3319904426$$z9783319904429$$w(OCoLC)1029785662 000845821 830_0 $$aHistory of computing (London, England) 000845821 852__ $$bebk 000845821 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-90443-6$$zOnline Access$$91397441.1 000845821 909CO $$ooai:library.usi.edu:845821$$pGLOBAL_SET 000845821 980__ $$aEBOOK 000845821 980__ $$aBIB 000845821 982__ $$aEbook 000845821 983__ $$aOnline 000845821 994__ $$a92$$bISE