AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Langages secrets codes, chiffres et autres cryptosystèmes (1998)

par Fred B. Wrixon

MembresCritiquesPopularitéÉvaluation moyenneMentions
581341,280 (3.76)1
An alphabetical exploration of the world of codes and ciphers and significant individuals involved in that field.
Aucun
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

» Voir aussi la mention 1

This book is so big, heavy, and awkward, it will kill me to read it whenever I actually feel up to it.
  Chica3000 | Dec 11, 2020 |
Indeholder "Acknowledgements", "Cryptology: From Hieroglyphs to the Internet", " The Beginnings of Cryptology", " The Renaissance", " Monarchies and Revolution", " The Mechanical Age", " The First World War", " The 1920s and 1930s", " The Second World War", " Naval Battles", " Espionage and Counterespionage", " The Postwar Era: Spies and Security", " The Race for Technology", " The New Cryptology: Public and Private Security Issues", "Ciphers", " Transposition Ciphers", " Reverse Transposition", " Reverse Variations", " Geometric Ciphers", " Route Transpositions", " Rail Fence", " Variations on the Rail Fence", " Horizontal Routes", " Alternate Horizontals", " Vertical Routes", " Alternate Verticals", " Diagonal Routes", " Alternate Diagonals", " Clockwise Routes", " Counterclockwise Routes", " Columnar Transposition", " Interrupted Columnar", " Diagonal Columnar", " Double Columnar", " Four Corner Transposition", " Triangle and Trapezoid Transpositions", " Word Transposition", " Substitution Ciphers", " Monoalphabetic Substitution", " Shift Ciphers", " Shift Cipher with Keyword", " Keyphrase Ciphers", " Random Substitution Ciphers", " Charlemagne's Cipher", " Zodiac Cipher", " Mary Queen of Scots Cipher", " Chevalier de Rohan's Cipher", " Rose Greenhow's Cipher", " Edgar Allan Poe's 'Gold Bug' Cipher", " Sherlock Holmes 'Adventures of the Dancing Men' Cipher", " The Shadow's Ciphers", " Geometric Ciphers", " Rosicrucian Cipher", " Freemason's Cipher", " Alphanumeric Ciphers", " Franklin-Dumas Cipher", " 'The Man from Scotland Yard' Cipher", " Multiliteral Forms", " Polybius Checkerboard", " Elizabeth Van Lew's Cipher", " Knock Cipher", " Multiliteral Variations", " Multiple Equivalents", " Variants", " Multiliteral Ciphers with Keyword", " Multiliteral Tables", " Russian Nihilist Cipher", " Straddling Checkerboard", " Polyalphabetic Substitution", " Disks", " Alberti's Disk", " Porta's Disk", " Tableux", " Trithemius's Tabula Recta", " Vigenere's Table", " Key Progression", " Marie Antoinette's Cipher", " Variations of Vigenère's Table", " Gronsfeld Cipher", " Beaufort Cipher", " Polygraphic Ciphers", " Porta's Digraphic Cipher", " Playfair Cipher", " Two-square Cipher", " Four-Square Cipher", " Trigraphic Ciphers", " Algebraic Ciphers", " Fractionating Ciphers", " Aperiodic Fractionating Ciphers", " Periodic Encipherment", " Tripartite Fractionating Ciphers", " Bifid Cipher", " ADFGX", " ADFGVX", " Cipher Devices and Machines", " Cipher Devices", " Thomas Jefferson's Wheel Cypher", " Wadsworth's Device", " Wheatstone's Cryptograph", " Saint-Cyr Slide", " Cylindrical Cryptograph", " Pletts's Device", " M-138 And M-138A", " M-94", " Advancements in Cipher Machines", " M-209", " Electrically Wired Rotors", " Edward Hebern's Electric Code Machine", " Elecronic cipher machine (ECM) and ECM Mark II", " Sigaba", " Enigma", " Typex", " Colossus", " Red", " Alphabetical Typewriter '97 And The Purple Analog", " Unbreakable Ciphers", " Baudot Code/Vernam Cipher", " Mauborgne's One-Time System", " One-Time Pads", " VIC Cipher", " Computer Cryptography", " Data Encryption Standard", " Two-Key Cryptography", " RSA Cryptoalgorithm", " Authentication", " Key Generation", " Quantum Cryptography", " Fundamentals of Quantum Computation", " Quantum Cryptography", " Cryptanalysis", " Cryptanalytic Techniques", " Hints For Breaking Polyalphabetic Ciphers", "Codes", " Nomenclators", " How To Make A Nomenclator", " Benjamin Tallmadge's Nomenclator", " XYZ Nomenclator", " James Madison's Nomenclators", " Book Codes", " How To Make A Book Code", " Benedict Arnold's Book Code", " Nicholas Trist's Book Code", " Presidential Election of 1876", " Codebooks", " How To Make A One-Part Code", " How To Make A Two-Part Code", " Early State Department Codes", " State Department Code of 1867", " Chief Signal Officer's Code (Circa 1871)", " The Cipher of the Department of State (1876)", " The Cipher of the Deparmtent of State (1899)", " Green Cipher", " Codes in World War I", " Zimmermann Telegram", " American Trench Code", " The River Series: Potomac", " The River Series: Mohawk", " Telephone Code", " The Lake Series: Champlain", " The Lake Series: Huron", " American Radio Service Code No. I", " Choctaw 'Codetalkers'", " Commercial Codes", " The Slater Code", " The Acme Code", " Murray Teleprinter Process", " Q Code", " Pre-World War II Codes", " Gray Code", " Department of State Code A-1", " Brown Code", " World War II Codes", " Black Code", " Merchant Ships' Code", " The "J" Series", " JN25", " Native American 'Codetalkers'", " Quadratic Code", " Codes In Everyday Life", " Universal Product Code (UPC)", " Zip Code", " ASCII", " Banking Security Codes", " Genetic Code", " Codebreaking", " Breaking Enciphered Codes", " Signals", " Hand and Arm Signals", " Naval Flaghoist Signals", " Hand-Held Signaling Systems: Flags, Disks and Torches", " Light Signals", " Constant Illumination Signals", " Pyrotechnic and Chronosemic Systems", " Reflected and Flashed Light", " Mechanical Signaling Systems", " Hand-Held Semaphore", " Technical Advancemenets", " The Electronic War Zone: Signals Security and Signals Intelligence", " Steganography", " Technical Methods of Concealment", " Invisible Inks", " How to Make an Invisible Ink", " Cryptophotographic Techniques", " Microdots", " Linguistic Concealments", " Semagrams", " Semagrams in Writing", " Grilles", " Null Ciphers", " Jargon Codes", " Modern Transmissions Security", " Laser And Infrared Technology", " Pulse Code Modulation", " Burst/Spurt Transmissions", " Spread Spectrum", " Scripts & Languages", " Protowriting", " Solved Scripts", " Deciphering an extinct script", " Cuneiform", " Decryption", " Egyptian Hieroglyphs", " Decryption", " Hittite Cuneiform and Hieroglyphs", " Decryption", " Linear B", " Decryption", " Mayan Glyphs", " Decryption", " Unsolved Scripts", " Proto-Elamite", " Indus Seals", " Linear A", " The Phaistos Disk", " Etruscan", " Rongorongo", " Voynich Manuscript", " Cryptic Scripts", " Runes", " Ogham", " Modern Pictographic Scripts", " Chinese", " Japanese", " Scripts and Signs for Special Interest Groups", " Shorthand", " Scripts For the Sight-Impaired", " Braille", " Moon type", " Sign Language", " Languages: Invented, International and Artificial", " Solresol", " Volapük", " Esperanto", "Biographies", " Alberti, Leon Battista", " Bazeries, Etienne", " Cardano, Girolamo", " Champollion, Jean Francois", " Chappe, Claude", " Driscoll, Agnes", " Evans, Arthur", " Fabyan, George", " Friedman, Elizabeth", " Friedman, William", " Hagelin, Boris", " Hebern, Edward", " Hitt, Parker", " Kasiski, Friedrich", " Kerkhoffs, Auguste", " Kullback, Solomon", " Lamphere, Robert", " Mauborgne, Joseph", " Myer, Albert", " Porta, Giovanni", " Rawlinson, Henry", " Rossignol, Antoinne", " Safford, Laurence", " Trithemius, Johannes", " Ventris, Michael", " Vigenere, Blaise de", " Wheatstone, Charles", " Yardley, Herbert ", "Quizzes And Answers", "Appendix", "Glossary", "Bibliography", "Index".

Mest historiske fortællinger. Ikke ret meget hård teori. ( )
  bnielsen | Dec 25, 2016 |
Encyclopedic explanation of just about every type of code known, along with historical discussions. ( )
  rondoctor | Dec 25, 2009 |
3 sur 3
aucune critique | ajouter une critique
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Titre original
Titres alternatifs
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Date de première publication
Personnes ou personnages
Lieux importants
Évènements importants
Films connexes
Épigraphe
Dédicace
Premiers mots
Citations
Derniers mots
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Langue d'origine
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais (2)

An alphabetical exploration of the world of codes and ciphers and significant individuals involved in that field.

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: (3.76)
0.5
1
1.5
2 1
2.5
3 11
3.5 2
4 12
4.5 2
5 5

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 206,091,290 livres! | Barre supérieure: Toujours visible