Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century
Discover the first unified treatment of today's most essentialinformation technologies— Compressing, Encrypting, andEncoding
With identity theft, cybercrime, and digital file sharingproliferating in today's wired world, providing safe and accurateinformation transfers has become a paramount concern. The issuesand problems raised in this endeavor are encompassed within threedisciplines: cryptography, information theory, anderror-correction. As technology continues to develop, these fieldshave converged at a practical level, increasing the need for aunified treatment of these three cornerstones of the informationage.
Stressing the interconnections of the disciplines, Cryptography,Information Theory, and Error-Correction offers a complete, yetaccessible account of the technologies shaping the 21st century.This book contains the most up-to-date, detailed, and balancedtreatment available on these subjects. The authors draw on theirexperience both in the classroom and in industry, giving the book'smaterial and presentation a unique real-world orientation.
With its reader-friendly style and interdisciplinary emphasis,Cryptography, Information Theory, and Error-Correction serves asboth an admirable teaching text and a tool for self-learning. Thechapter structure allows for anyone with a high school mathematicseducation to gain a strong conceptual understanding, and provideshigher-level students with more mathematically advanced topics. Theauthors clearly map out paths through the book for readers of alllevels to maximize their learning.
Cryptography, Information Theory, and Error-Correction is anexcellent in-depth text for both graduate and undergraduatestudents of mathematics, computer science, and engineering. It isalso an authoritative overview for IT professionals, statisticians,mathematicians, computer scientists, electrical engineers,entrepreneurs, and the generally curious.
What people are saying - Write a review
Classical Ciphers and Their Cryptanalysis
RSA Key Searches SSL and Encrypting Email
17 other sections not shown