Encrypting the Past

Encrypting the Past
Author: Kirstin Gwyer
Publisher: Oxford University Press, USA
Total Pages: 255
Release: 2014
Genre: History
ISBN: 0198709935

Download Encrypting the Past Book in PDF, Epub and Kindle

Encrypting the Past puts forward the literary category of the first-generation German-Jewish Holocaust novel, showing that Holocaust literature was being written decades before postwar authors such as Sebald were credited with having found new ways of reflecting the unspeakable.


Encrypting the Past
Language: en
Pages: 255
Authors: Kirstin Gwyer
Categories: History
Type: BOOK - Published: 2014 - Publisher: Oxford University Press, USA

GET EBOOK

Encrypting the Past puts forward the literary category of the first-generation German-Jewish Holocaust novel, showing that Holocaust literature was being writte
Real-World Cryptography
Language: en
Pages: 398
Authors: David Wong
Categories: Computers
Type: BOOK - Published: 2021-10-19 - Publisher: Simon and Schuster

GET EBOOK

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, G
Crypto Wars
Language: en
Pages: 292
Authors: Craig Jarvis
Categories: Computers
Type: BOOK - Published: 2020-12-30 - Publisher: CRC Press

GET EBOOK

The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer
Encryption for Digital Content
Language: en
Pages: 209
Authors: Aggelos Kiayias
Categories: Computers
Type: BOOK - Published: 2010-11-02 - Publisher: Springer

GET EBOOK

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fin
Cryptography's Role in Securing the Information Society
Language: en
Pages: 721
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 1996-11-29 - Publisher: National Academies Press

GET EBOOK

For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and