Fashion Sale Hier klicken Strandspielzeug reduziertemalbuecher Cloud Drive Photos Alles für die Schule Learn More Eukanuba Hier klicken Fire Shop Kindle PrimeMusic Autorip Summer Sale 16

Kundenrezensionen

4,8 von 5 Sternen
84
4,8 von 5 Sternen
Format: Taschenbuch|Ändern
Preis:8,99 €+ Kostenfreie Lieferung mit Amazon Prime
Ihre Bewertung(Löschen)Ihre Bewertung


Derzeit tritt ein Problem beim Filtern der Rezensionen auf. Bitte versuchen Sie es später noch einmal.

am 21. Mai 2002
In "The Code Book" werden Verschlüsselungsmethoden seit früheren Zeiten bis zum heutigen Tag erklärt. Die Erklärungen sind verständlich geschrieben und erhalten praktische Beispiele aus der Weltgeschichte.
Wenn man einmal damit anfängt ein Kapitel zu lesen, will man einfach nicht mehr aufhören denn die Lösung um das Method zu "knacken" wird oft erst in den letzten Seiten verraten.
Für Informatiker, die mit solche Themen wie Public-Key-Encryption (zB. PGP) zu tun haben, liefert das Buch ein sehr gutes Hintergrund zu den heutigen Technologien.
0Kommentar| 15 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 17. November 2014
Simon Singh hat einen bildhaften und wirklich guten Schreibstil der Lust auf mehr macht .
Alte und neue Verschlüsselungen Werden erklärt und die Ursprünge aufgezeigt .
Kluge Köpfe haben faszinierende Arbeit geleistet .
22 Kommentare|War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 28. Juli 2000
I read the book from cover to cover in one sitting and then eagerly dashed to the website to learn more about the cipher challenge that author Singh poses to those of us who think, gee this seems easy, I could take a crack at it. From Egyptian hieroglyphics to Elizabethan intrigue to modern-day Internet encryption, the book eloquently covers the ways in which humans have used codes and ciphers to conquer and cover up their activities. While I was vaguely aware of the Rosetta Stone and the role of Navajo codetalkers during the War, the book made me realize how complex the field is and how slow the progress has been over centuries to refine and evolve these secretive methods of communication. Singh's style is never stuffy or dry. I will be sure to read Fermat's Last Theorem.
0Kommentar| 3 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 13. Juli 2013
Ein toller Überblick/Einstieg in die Kryptografie.
Mit faszinierenden Geschichten, die Hollywood nicht erfinden könnte.

Mir hat besonders die Stelle gefallen durch die mir klar wurde, dass eigentlich polnische Kryptografen den Grundstein für den Untergang des dritten Reiches gelegt haben :)

Faszinierender Twist!
0Kommentar|War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 30. Mai 2000
Desde el comienzo del libro, Simon Singh narra con detalle y fuerza piezas claves de la historia de la codificación, haciendo que un tema tan complejo sea de la más fácil comprensión. Los hechos históricos aparecen descritos con minuciosidad manteniendo un ritmo que hace de cada página sólo un anticipo de otra aún más interesante. Las vidas de los personajes clave son recogidas en forma de pequeñas biografías que hacen que te sumerjas con facilidad en sus emociones, sus dificultades y en la presión que rodeaba su trabajo. Se trata, en general, de una obra divulgativa muy bien escrita y con un contenido apasionante. Seguiremos los pasos del Sr. Singh..
0Kommentar| Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 3. April 2000
A common error occurs in the book: not ENIGMA(USA 1945) as most people believe, not COLOSSUS(UK 1943) as Singh claims, but Z3(Germany 1941) has been the first programmable computer. If you come to Munich, you can see a rebuilt of this maschine in the "Deutsche Museum".
Some militairs were interested to use it for cryptography as well but it did not come to such an application in WW2.
Some technical data of Z3: 2000 relais, floating point arithmetic (22 Bit), memory: 64 words
Velocity: 3 seconds for multiplication, division or square root
0Kommentar| Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 9. Juni 2013
Singh spannt den Bogen von einfachen Verschlüsselungen in der Antike bis zur Quanten-Kryptographie der Zukunft. Das Buch ist immer spannend zu lesen und ist auch für Leute die sich noch nie mit dem Thema beschäftigt haben interessant und gut verständlich!
0Kommentar|War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 4. November 2009
This book is about cryptology (a term that includes both code making or cryptography and code breaking or cryptanalysis). However, the primary focus is not the science of cryptology or its history although both are covered in sufficient detail. It is, rather, on people; the people who made the codes, the people who broke the codes and the people whose lives were affected by the codes. The book proceeds in a chronological manner as it follows the age old war between code makers and code breakers from the distant past to well into the future.

Singh explains the not-so-easy mathematics and technology behind code making and breaking in a vivid and very accessible style. Elusive topics such as the operation of the Enigma, the mathematics of RSA and the principals of quantum cryptology are so well explained that most readers will grasp them with a single reading. It is hard not to be inspired by this book. Many times you will find yourselves grabbing a sheet of papers and attempting to work out the codes yourself. The book provides a set of ciphers to work on your own and a list of further reading for those interested to follow up on Alice, Bob and Eve (hypothetical characters used to explain techniques in cryptology)..

"Uijt jb b gjof cppl" replace each letter by the one that precedes it in the alphabet and you get "This is a fine book". This simple cipher, called the Cesar shift cipher, is one of the earliest known ciphers and is discussed in the first chapter which covers cryptology from ancient Greece until the fourteenth century and narrates the gripping tale of Mary Queen of the Scots. The second chapter covers the evolution of both cryptology and cryptanalysis until the 20th century and narrates, among others, the mysterious tale of Beale's ciphers. The third and fourth chapters cover the evolution of cryptology during the first and second world wars and mainly concentrate on the operation and the cracking of the famous German Enigma machine. The fifth chapter covers the Navajo code talkers used by the US in WW2 as well as the inspiring tales of decipherment of Hieroglyphics mainly by Champollion and of Linear B by, among others, Michael Ventris. Chapters six and seven are about Modern Cryptology. They covers the story behind the ground breaking advancements in cryptography, e.g. public key cryptography, that fueled internet communication and commerce. It also ponders in some detail over the issue of privacy versus security. Chapter eight is about the future of Cryptology and how both code makers and code breakers are starting to make use of Quantum mechanics to take cryptology to a whole new level.

As mentioned earlier, this book is about people and it does a good job in paying tribute many of the usually unsung heroes of cryptology.

All said, this is one of the most gripping, amusing and rewarding general science books; it even has instruction on hiding a message within a hardboiled egg!!
0Kommentar|War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 2. Juli 2000
A combination of easy-to-understand explanations, history, suspense, and just plain fun made this the best history book I've ever read. Singh starts with Mary Queen of Scots and her fumbled plot to kill Queen Elizabeth. The history behind the plot was explained, and then he back-tracked all the way to the fifth century b.c. to give us an idea of where it all started from in documented history. The author's style of creating suspense surrounding a particular event and then giving you history on that event before he tells you the outcome was an excellent way to keep a non history buff glued to the pages.
The characters were well written within the history. Instead of falling asleep to a list of names and dates, I was saddened to read of the fate of Alan Turing when they discovered his secret, all fired up about the buried treasure surrounding the Beale Papers, and laughing at the quandry of the poor Navajos who were 'captured' by Americans who mistook them for Japanese spies.
The other high quality aspect was the cryptography explanations. Never having known much about cryptography beyond the absolute basics behind Enigma, I found it extremely easy to understand his explanations of how this or that cypher worked, and how historical figures went about cracking them. Even his explanations of how Enigma worked were simple to comprehend. Based on his explanations I'm confident I could create coded messages myself - maybe even decipher one!
It probably has a lot more to do with my ignorance of Egyptology than the authors explanations, but the only portion of the book I didn't like was the explanation of how the hieroglyphs were deciphered. The explanations themselves were clear, but it seemed to me there were some assumptions made about why people in ancient Egypt did certain things that just seemed a bit off to me. The author was clear enough and accurate enough about everything else that I'm assuming the fault is mine, and I'll be reading some Egyptian history sometime soon.
0Kommentar|War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden
am 12. Juni 2000
The solution of signals encrypted with the Enigma was one of the outstanding efforts by the Allies during WWII. The contributions of the Polish code breakers to this effortwere of monumental importance as were the efforts made at Bletchley Park. Reading signals from Nazi Uboats, microwave radar and the efforts of brave men led to success in the battle of the North Atlantic. Moreover the concept of designing an electromechanical mechine to recover clear text represents one of the important early steps in the history of the development of the modern computer. This is most clearly seen in the relationship between Colossus and the Lorenz Gehimeschreiber. This book provides an extremely thorough and readily understandable explaination of the operation of Egnima. For this reason alone, I consider it extremely rewarding reading. For those who have not previously explored any of the history of cryptography this book provides a highly readable overview of remote and recent events as they relate to the topic. I found it extremely informative with regard to the function of the plug board on the Enigma. It was quite interesting to learn that this component of the device provided the the greatest number of possible encryption but was the second least secure aspect of its operation. Operator error, of course, being the very least.
0Kommentar|War diese Rezension für Sie hilfreich?JaNeinMissbrauch melden