Real Life Cryptology (Record no. 51695)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01571nam a2200229Ia 4500 |
| 000 - LEADER | |
| fixed length control field | 02060naaa 00277uu |
| 001 - CONTROL NUMBER | |
| control field | https://directory.doabooks.org/handle/20.500.12854/35937 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 211013s9999 xx 000 0 und d |
| 024 ## - OTHER STANDARD IDENTIFIER | |
| Standard number or code | 10.5117/9789462985544 |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 245 #0 - TITLE STATEMENT | |
| Title | Real Life Cryptology |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | Amsterdam University Press |
| Date of publication, distribution, etc. | 2018 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of private applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages. |
| 540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
| Terms governing use and reproduction | Creative Commons |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Cryptography |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Lang, Benedek |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://library.oapen.org/bitstream/20.500.12657/28452/1/1001507.pdf">https://library.oapen.org/bitstream/20.500.12657/28452/1/1001507.pdf</a> |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://library.oapen.org/bitstream/20.500.12657/28452/1/1001507.pdf">https://library.oapen.org/bitstream/20.500.12657/28452/1/1001507.pdf</a> |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="www.oapen.org">www.oapen.org</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Book |
| Withdrawn status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | Not For Loan | Directory of Open Access Books | Directory of Open Access Books | 12/22/2021 | 12/22/2021 | 12/22/2021 | E-Book |