Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of about 45 related to Crypto: How the Code Rebels Beat the Government--Saving Privacy in the ....   

The Best of Technology Writing 2007

Steven Levy - Literary Collections - 2007 - 375 pages
The year’s best writing on tech: a collection as imaginative and compelling as its dynamic subject "This book is not just an illuminating and instructive guide to our high-tech ...
Limited preview - About this book

The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness

Steven Levy - Business & Economics - 2006 - 304 pages
On October 23, 2001, Apple Computer, a company known for its chic, cutting-edge technology -- if not necessarily for its dominant market share -- launched a product with an ...
Limited preview - About this book

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition

Steven Levy - Computers - 2010 - 520 pages
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the ...
Limited preview - About this book

In The Plex: How Google Thinks, Works, and Shapes Our Lives

Steven Levy - Business & Economics - 2011 - 432 pages
Written with full cooperation from top management, including cofounders Sergey Brin and Larry Page, this is the inside story behind Google, the most successful and most admired ...
Limited preview - About this book

Cryptography InfoSec Pro Guide

Sean-Philip Oriyano - Computers - 2013 - 336 pages
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features ...
Limited preview - About this book

Brute Force: Cracking the Data Encryption Standard

Matt Curtin - Science - 2007 - 292 pages
In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles ...
Limited preview - About this book

Code Breaking in the Pacific

Peter Donovan, John Mack - Computers - 2014 - 387 pages
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces ...
Limited preview - About this book

Information Security and Privacy in Network Environments

DIANE Publishing Company - 1994 - 243 pages
Focuses on policy issues in three areas: national cryptography policy, including federal information processing standards and export controls; guidance on safeguarding ...
Full view - About this book

Turing And The Computer

Paul Strathern - Science - 2012 - 96 pages
No preview available - About this book

Privacy on the Line: The Politics of Wiretapping and Encryption

Whitfield Diffie, Susan Landau - Political Science - 2010 - 496 pages
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 ...
Limited preview - About this book

  1. My library
  2. Help
  3. Advanced Book Search