Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

History of Cryptography

The earliest recorded discussion of code-breaking has been found in a thirteenth century Arabian encyclopedia. The use of those techniques rapidly spread throughout Europe. Although most countries were using codes, the most successful ones were also breaking them. Julius Caesar is credited with creating one of the earliest cryptographic systems used to send military messages. TheCaesar Cipher used a substitution algorithm similar to the one in our example to secure his military message traffic. In fact, the military has long been the source of the best encryption algorithms because they typically are responsible for not only encrypting messages, but also with breaking enemy encryption. Since the fourteenth century, the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book