granchester paypal before the fall finding gobi Harry Potter House Eds
Search our site
Lily and the Octopus by Steven Rowley Read the opening extract of the brand new Steven Rowley book before its publication on 05/10/2017

Coding theory & cryptology books

See below for a selection of the latest books from Coding theory & cryptology category. Presented with a red border are the Coding theory & cryptology books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Coding theory & cryptology books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Advances in User Authentication by Dipankar Dasgupta, Abhijit Nag Advances in User Authentication
,
This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of...
Format: Hardback - Released: 10/08/2017

Advances in Cryptology - CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III by Jonathan Katz Advances in Cryptology - CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.The 72 revised full papers presented were carefully reviewed...
Format: Paperback - Released: 02/08/2017

Advances in Cryptology - CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II by Jonathan Katz Advances in Cryptology - CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.The 72 revised full papers presented were carefully reviewed...
Format: Paperback - Released: 28/07/2017

The Story of Codebreaking by Nigel Cawthorne The Story of Codebreaking


Format: Hardback - Released: 15/06/2017

Unsolved! The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies by Craig P. Bauer Unsolved! The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies

In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich...
Format: Hardback - Released: 30/05/2017

Fading and Shadowing in Wireless Systems by P. Mohana Shankar Fading and Shadowing in Wireless Systems

The author explores the impediments to efficient wireless transmission and techniques and proposes ways to mitigate these problems. Problems presented include both fading and shadowing, which increase the possibility of outrage in wireless systems.
Format: Hardback - Released: 12/05/2017

A Practical Approach to Compiler Construction by Des Watson A Practical Approach to Compiler Construction

This book provides a practically-oriented introduction to high-level programming language implementation. It demystifies what goes on within a compiler and stimulates the reader's interest in compiler design, an essential aspect of computer science. Programming language analysis and translation techniques are...
Format: Paperback - Released: 10/04/2017

Traversals The Use of Preservation for Early Electronic Writing by Stuart (Professor, University of Wisconsin-Milwaukee) Moulthrop, Dene (Director, Washington State University Vancouver) Grigar Traversals The Use of Preservation for Early Electronic Writing
, , ,
Many pioneering works of electronic literature are now largely inaccessible because of changes in hardware, software, and platforms. The virtual disappearance of these works--created on floppy disks, in Apple's defunct HyperCard, and on other early systems and platforms--not only puts...
Format: Hardback - Released: 07/04/2017

Coming Soon

Coding Theory and Applications 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings by Angela I. Barbero Coding Theory and Applications 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings

This book constitutes the refereed proceedings of the 5th International Castle Meeting on Coding Theory and Applications, ICMCTA 2017, held in Vihula, Estonia, in August 2017.The 24 full papers presented were carefully reviewed and selected for inclusion in this volume....
Format: Paperback - Released: 24/09/2017

How to Think Like a Coder Without Even Trying by Jim Christian How to Think Like a Coder Without Even Trying

A back-to-basics guide on coding for absolute beginners, whether adults or children - no prior experience required! Coding is set to change the way we work and the skills we will need in the future. For those who know nothing...
Format: Hardback - Released: 05/10/2017

Other books in this genre

Blockchain Applications A Hands-On Approach by Arshdeep Bahga, Vijay (Georgia Institute of Technology Atlanta USA) Madisetti Blockchain Applications A Hands-On Approach
,

Format: Hardback - Released: 31/01/2017

Directed Information Measures in Neuroscience by Michael Wibral Directed Information Measures in Neuroscience

Analysis of information transfer has found rapid adoption in neuroscience, where a highly dynamic transfer of information continuously runs on top of the brain's slowly-changing anatomical connectivity. Measuring such transfer is crucial to understanding how flexible information routing and processing...
Format: Paperback - Released: 03/09/2016

Codes and Ciphers - A History Of Cryptography by Alexander D'Agapeyeff Codes and Ciphers - A History Of Cryptography

This vintage book contains Alexander D'Agapeyeff's famous 1939 work, &quote;Codes and Ciphers - A History of Cryptography&quote;. Cryptography is the employment of codes and ciphers to protect secrets, and it has a long and interesting history. This fantastic volume offers...
Format: eBook - Released: 26/08/2016

The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday by Peter Ryan The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of...
Format: Paperback - Released: 18/03/2016

Iccsm 2015 - The Proceedings of the 3rd International Conference on Cloud Security and Management by Barbara Endicott-Popovsky Iccsm 2015 - The Proceedings of the 3rd International Conference on Cloud Security and Management


Format: Paperback / softback - Released: 01/10/2015

Big Data Forensics - Learning Hadoop Investigations by Joe Sremack Big Data Forensics - Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques About This Book * Identify, collect, and analyze Hadoop evidence forensically * Learn about Hadoop's internals and Big Data file storage concepts * A step-by-step guide to help you...
Format: Paperback - Released: 24/08/2015

Transactions on Data Hiding and Multimedia Security X by Yun Q. Shi Transactions on Data Hiding and Multimedia Security X

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and...
Format: Paperback - Released: 07/07/2015

Registered users have access to unique site features

Register now