Explore: Chiffrierung
Discover books, insights, and more — all in one place.
Learn more about Chiffrierung with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “chiffrierung”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1The Code Book
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
By Simon Singh

“The Code Book” Metadata:
- Title: The Code Book
- Author: Simon Singh
- Languages: ➤ English - fre - Spanish; Castilian - español, castellano
- Number of Pages: Median: 416
- Publisher: ➤ Buzdağı Yayınevi - BUR Biblioteca Univ. Rizzoli - Debate - DTV Deutscher Taschenbuch - Hanser Belletristik - Carl Hanser - Fourth Estate Limited - Ted Smart - J.-C. Lattès - Record - Anchor Books, a division of Random House, Inc. - Anchor - Publisher - LGF - Fourth Estate - HarperCollins Publishers Limited - Dtv - HarperCollins Publishers - Doubleday - Diane Pub Co
- Publish Date: ➤ 1999 - 2000 - 2001 - 2002 - 2004 - 2009 - 2010 - 2020
- Publish Location: ➤ Barcelona, Spain - New York - London - Paris, France
“The Code Book” Subjects and Themes:
- Subjects: ➤ Cryptography - History - Data encryption (Computer science) - Coding theory - Confidential communications - Ciphers - Codes - Cryptographie - Histoire - Geschichte - Kryptologie - Chiffrement (Informatique) - Geheimschrift - Long Now Manual for Civilization - Angewandte Mathematik - Dechiffrierung - Enigma (Chiffriermaschine) - Chiffrierung - Einführung - Communications - Cipher and telegraph codes - Code names - Décodeur - Informatique quantique - Confidentialité - Communication humaine - Écriture chiffrée - 20e s. - Écriture secrète - Origines - Cryptography--history - Data encryption (computer science)--history - Z103 .s56 1999 - 652/.8/09
Edition Identifiers:
- The Open Library ID: ➤ OL8888315M - OL35397422M - OL34436394M - OL32170054M - OL39819045M - OL12567309M - OL9036429M - OL9033053M - OL13321028M - OL12712878M - OL26731908M - OL28654628M - OL28274557M - OL9219382M - OL7264667M - OL7440495M - OL7995929M - OL22739007M - OL8997995M - OL8997992M - OL42381M - OL23243717M - OL21994890M
- Online Computer Library Center (OCLC) ID: ➤ 45273863 - 45010734 - 43323003 - 59459928 - 52534625 - 41572673
- Library of Congress Control Number (LCCN): 99035261
- All ISBNs: ➤ 9783446198739 - 9788501055989 - 0756754739 - 2253150975 - 0007635745 - 9788483062784 - 2709620480 - 3423330716 - 6056902455 - 8817125393 - 9781857028799 - 9780756754730 - 0385495323 - 9780385495318 - 9781439580165 - 3446201696 - 9783423621670 - 9782709620482 - 9781841154961 - 1439580162 - 9781857028898 - 9783423330718 - 1841154962 - 9780385495325 - 9780007378302 - 9788817125390 - 9783446201699 - 848306278X - 0007378300 - 0385495315 - 9786056902451 - 9780007635740 - 8501055980 - 3423621672 - 1857028791 - 3446198733 - 9782253150978 - 1857028899
First Setence:
"On the morning of Saturday, October 15, 1586, Queen Mary entered the crowded courtroom at Fotheringhay Castle."
Author's Alternative Names:
"SIMON SINGH" and "Singh Simon"Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The Code Book at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Privacy on the line
By Whitfield Diffie and Susan Landau

“Privacy on the line” Metadata:
- Title: Privacy on the line
- Authors: Whitfield DiffieSusan Landau
- Language: English
- Number of Pages: Median: 472
- Publisher: MIT Press - The MIT Press
- Publish Date: 1998 - 2007 - 2010 - 2018
- Publish Location: Cambridge, Mass
“Privacy on the line” Subjects and Themes:
- Subjects: ➤ Law and legislation - Right of Privacy - Wiretapping - Data encryption (Computer science) - Telecommunication - Electronic surveillance - Electronic intelligence - Political aspects of Telecommunication - Political aspects of Electronic surveillance - Recht op privacy - Afluisteren - Geheimschrift - Data security & data encryption - Media, information & communication industries - Privacy & data protection - Political Science - Politics / Current Events - Politics/International Relations - Communications - Political Freedom & Security - Civil Rights - Telecommunications - Political Science / Political Freedom & Security / General - Media Studies - Political Freedom & Security - General - Social Aspects - United States - Land rights - Telephone technology - Privacy, right of - United states, politics and government - Electronic surveillance, united states - Telecommunication policy, united states - Écoute électronique - Chiffrement (Informatique) - Droit - Droit à la vie privée - LAW - Constitutional - Public - Droit de la protection des données - Protection de la vie privée - Télécommunications - Cryptage - Codage - Cryptografie - Chiffrierung - Lauschangriff - Recht - Criminal Law & Procedure - U.S. - Law - U.S. - Law, Politics & Government - Political freedom & security - Political aspects
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL29753799M - OL29076315M - OL28449355M - OL9575370M - OL18000255M - OL23276863M - OL694991M
- Online Computer Library Center (OCLC) ID: 74915665 - 520718329 - 42328563 - 37806171
- Library of Congress Control Number (LCCN): 2006035514 - 97042347
- All ISBNs: ➤ 0262042401 - 9780262256018 - 026225140X - 0262256010 - 0262514001 - 9780262041676 - 9780262042406 - 9780262514002 - 9780262251402 - 0262041677
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Privacy on the line at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Privacy on the line
By Whitfield Diffie and Susan Landau

“Privacy on the line” Metadata:
- Title: Privacy on the line
- Authors: Whitfield DiffieSusan Landau
- Language: English
- Number of Pages: Median: 366
- Publisher: The MIT Press
- Publish Date: 1999
“Privacy on the line” Subjects and Themes:
- Subjects: ➤ Protection de la vie privée - Wiretapping - Codage - Law and legislation - Right of Privacy - Droit de la protection des données - Recht - Geheimschrift - Cryptage - Afluisteren - Chiffrierung - Recht op privacy - Télécommunications - Lauschangriff - Data encryption (Computer science) - Privacy, right of - United states, politics and government
- Places: United States - Etats-Unis d'Amérique - USA
Edition Identifiers:
- The Open Library ID: OL9485914M
- Library of Congress Control Number (LCCN): 97042347
- All ISBNs: 0262541009 - 9780262541008
First Setence:
"In the early nineteenth century it took six weeks for the British government to send a message from London to its representative in Delhi."
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Privacy on the line at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Enigma
By Montefiore, Hugh.

“Enigma” Metadata:
- Title: Enigma
- Author: Montefiore, Hugh.
- Number of Pages: Median: 528
- Publisher: ➤ Cassell Military Paperbacks - Weidenfeld Military
- Publish Date: 2004
“Enigma” Subjects and Themes:
- Subjects: ➤ Spion - Weltkrieg - Cryptography - Codierung - Electronic intelligence - Spionage - World War (1939-1945) fast (OCoLC)fst01180924 - Secret service - Enigma - World War, 1939-1945 - Chiffrierung - History - Enigma cipher system
Edition Identifiers:
- The Open Library ID: OL9593097M
- All ISBNs: 0304366625 - 9780304366620
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Enigma at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Goethes geheimes Vermächtnis
By Manfred Dimde

“Goethes geheimes Vermächtnis” Metadata:
- Title: Goethes geheimes Vermächtnis
- Author: Manfred Dimde
- Language: ger
- Number of Pages: Median: 264
- Publisher: Bettendorf
- Publish Date: 1995
- Publish Location: Essen
“Goethes geheimes Vermächtnis” Subjects and Themes:
- Subjects: Music - Knowledge - Music in literature - Chiffrierung - Faust (Goethe, Johann Wolfgang von)
- People: ➤ Johann Wolfgang von Goethe (1749-1832) - Johann Wolfgang von Goethe
Edition Identifiers:
- The Open Library ID: OL35638516M
- Online Computer Library Center (OCLC) ID: 34526655
- All ISBNs: 9783884980682 - 3884980688
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Goethes geheimes Vermächtnis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Codes, Chiffren & andere Geheimsprachen
By Fred B. Wrixon

“Codes, Chiffren & andere Geheimsprachen” Metadata:
- Title: ➤ Codes, Chiffren & andere Geheimsprachen
- Author: Fred B. Wrixon
- Language: ger
- Number of Pages: Median: 704
- Publisher: Konemann
- Publish Date: 2000
- Publish Location: Koln
“Codes, Chiffren & andere Geheimsprachen” Subjects and Themes:
- Subjects: Chiffrierung - Codierung - Kryptologie
- Time: Geschichte
Edition Identifiers:
- The Open Library ID: OL32086812M
- Online Computer Library Center (OCLC) ID: 76248586
- All ISBNs: 9783829038881 - 3829038887
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Codes, Chiffren & andere Geheimsprachen at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Information Security and Cryptology – ICISC 2008
By Hutchison, David - undifferentiated

“Information Security and Cryptology – ICISC 2008” Metadata:
- Title: ➤ Information Security and Cryptology – ICISC 2008
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Publisher: Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security and Cryptology – ICISC 2008” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Computational complexity - Information Systems - Computer science - Computer networks - Data protection - Computer software - Cryptography - Computer security - Authentication - Congresses - Authentifikation - Kongress - Chiffrierung - Kryptologie - Digital Rights Management - Privatsphäre - Kryptoanalyse - Rechnernetz - Datensicherung - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL25549179M
- Online Computer Library Center (OCLC) ID: 310400745
- Library of Congress Control Number (LCCN): 2009935271
- All ISBNs: 9783642007309 - 3642007295 - 3642007309 - 9783642007293
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Cryptology – ICISC 2008 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Foundations and Practice of Security Lecture Notes in Computer Science
By Pascal Lafourcade

“Foundations and Practice of Security Lecture Notes in Computer Science” Metadata:
- Title: ➤ Foundations and Practice of Security Lecture Notes in Computer Science
- Author: Pascal Lafourcade
- Publisher: Springer
- Publish Date: 2012
“Foundations and Practice of Security Lecture Notes in Computer Science” Subjects and Themes:
- Subjects: ➤ Computer security - Zugriffskontrolle - RFID - Systèmes informatiques - Computersicherheit - Privatsphäre - Chipkarte - Mesures de sûreté - Chiffrierung - Kryptoanalyse - Rechnernetz - Datensicherung - Formale Methode - Informationssystem - Serviceorientierte Architektur - Congresses - Web Services - Kryptosystem - Kryptologie - Verifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26138614M
- Library of Congress Control Number (LCCN): 2011945035
- All ISBNs: 9783642279003 - 3642279007
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Foundations and Practice of Security Lecture Notes in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Information security and cryptology - ICISC 2007
By ICISC 2007 (2007 Seoul, Korea)

“Information security and cryptology - ICISC 2007” Metadata:
- Title: ➤ Information security and cryptology - ICISC 2007
- Author: ICISC 2007 (2007 Seoul, Korea)
- Language: English
- Number of Pages: Median: 366
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Information security and cryptology - ICISC 2007” Subjects and Themes:
- Subjects: ➤ Cryptography - Rechnernetz - Datensicherung - Computersicherheit - Chipkarte - Computer security - Biometrie - Chiffrierung - Congresses - Kryptologie - Kryptoanalyse - Authentifikation - Computational complexity - Data encryption (Computer science) - Computer networks - Information networks - Data protection - Computer software
Edition Identifiers:
- The Open Library ID: OL25336963M
- Online Computer Library Center (OCLC) ID: 182526854
- Library of Congress Control Number (LCCN): 2007939824
- All ISBNs: 9783540767879 - 3540767878
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information security and cryptology - ICISC 2007 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.