Foreword by William J. Perry Most of us experience the interactions of cryptography, communications, and computers as we go about our daily activities. While on our laptops, we conduct secure financial transactions and communicate about business and personal matters. But not long ago, only people with special security clearances working at secured communications centers had such access. This book looks at how this dramatic transition came about. J. V. Boone presents a historical overview of technological developments in ...
Read More
Foreword by William J. Perry Most of us experience the interactions of cryptography, communications, and computers as we go about our daily activities. While on our laptops, we conduct secure financial transactions and communicate about business and personal matters. But not long ago, only people with special security clearances working at secured communications centers had such access. This book looks at how this dramatic transition came about. J. V. Boone presents a historical overview of technological developments in cryptology and the closely associated fields of communications and computers. Having directed research at the National Security Agency (NSA) for years, he is well suited to tell the story. Boone identifies milestone accomplishments and activities in the three fields to provide an introduction to the talented people who have led developments and applications. He includes illustrations to give a feel for the equipment and systems, but his book's focus is on the essential ingredient for success in cryptology: brainpower. Everyone from high school students to policy developers in government and industry will be drawn to this concise history of the joint progress of cryptology, communications, and computers. Although he writes primarily from a military intelligence and command/control viewpoint, there are no involved explanations about how individual pieces of equipment function and no elaborate mathematical presentations. For those whose curiosity he has stimulated, he provides additional references.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Good condition. Very Good dust jacket. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Prompt shipment, with tracking. we ship in CLEAN SECURE boxes Coding Theory & Cryptology: Good Ex-library Hardcover with Dust Jacket, contains pocket, stamps, label, Library Binding, Clean Pages, Prompt shipping with tracking.