![]() ![]() ![]() The military historical and political aspects are anyway much more interesting for the philistines of applied science. The methods used are described in detail, which is sometimes too advanced for beginners, and because of this, it´s sometimes advisable to skim the purely theoretical descriptions as in my case (laziness and layman). The further the time progresses, the more complex the techniques become and get ever shorter expiration dates because of the specialists trying to crack them. A journey through the history of coding, cryptography, and codebreaking.Ĭhronologically arranged, the book begins in ancient times and describes simple forms of encryption such as shaving the head, tattooing a message, waiting a few weeks, or wrapping a leather strip with important information around a stick of specified thickness. ![]()
0 Comments
Leave a Reply. |