1. |
Albert, Burton, Jr. Codes for Kids (Whitman, 1976) |
2. |
Albert, Burton, Jr. More Codes for Kids |
|
(Whitman, 1979) |
3. |
B.Beckett. Introduction to cryptology (Blackwell |
|
Scientific Publications, 1988) |
4. |
Babson, Walt. All Kinds of Codes (Scholastic, 1976) |
5. |
Barker, Wayne G., Manual of Cryptography (1981) |
6. |
Ban-on, John, KGB: The Secret Work of Soviet |
|
Secret Agents (1973) |
7. |
Brassaid G. Modem Kryptology. Springer-Veriag (1988) |
8. |
Bruce Schneier, "Applied Cryptography: Protocols, |
|
Algorithms, and Source Code in C", John Wiley & |
|
Sons (1993) |
9. |
Clark, R.W. The Man Who Broke Purple: A Life |
|
of the World's Greatest Cryptologist, Colonel |
|
William F. Friedman (Little, 1977) |
10. |
Banning, Dorothy E., Cryptography and |
|
Protection (1982) |
II. |
Dulles, Alien A., The Craft of Intelligence (1963) |
12. |
Friedman, W.F., Elements ofCryptanalysis (1976) |
13. |
Gardner, Martin, Codes, Ciphers, and Secret |
|
Writing (1984) |
14. |
Gleason, Norma. Cryptograms and Spygrams |
|
(Dover, 1981) |
15. |
Harris, Christopher, et al., Hazardous Waste: |
|
Confronting the Challenge (1987) |
16. |
Kahn, David, Kahn on Codes (Macrnillan, 1983) |
17. |
Kahn, David. Kahn on Codes: New Secrets of |
|
Cryptology (Macrnillan, 1983) |
18. |
Kahn, David. The Codebreakers: The Story of |
|
Secret Writing (Macrnillan, 1967) |
19. |
Konheim, A.G. Cryptography: A Primer (Wiley, 1981) |
20. |
Laflin, John. Codes and Ciphers: Secret Writing |
|
Through the Ages (Harper, 1964) |
21. |
Landreth, Bill, A Hacker's Guide to Computer |
|
Security, (Microsoft Press, 1985) |
22. |
Levy, Steven. Hackers: Heroes of the Computer |
|
Revolution. (Doubleday, 1984) |
23. |
Lysing, Henry. Secret Writing: An Introduction to |
|
Cryptograms, Ciphers, and Codes (Dover, 1974) |
24. |
Mayer, Carl, and Matyas, Stephen, Cryptography: |
|
New Dimensions in Computer Security (1982) |
25. |
Parker, Donn B. Crime By Computer. (Charles |
|
Scribner's Sons, 1976) |
26. |
Pierce, С. C" Crypto-privacy (1988) |
27. |
Sarnoff, Jane and Ruffins, Reynold. The Code and |
|
Cipher Book (Scribner, 1975) |
28. |
Seberry J., Pieprzyk J., Cryptography. An intro- |
|
duction to computer security. (Prentice Hall, 1989) |
29. |
Sinkov, Abraham, Cryptanalysis: A Mathematical |
|
Approach (1980) |
30. |
Smith, L.D. Cryptography: The Science of Secret |
|
Writing (Dover, 1955) |
31. |
Wmterbotham, Frederick W., The Ultra Secret (1982) |
32. |
Wohlstetter, Roberta, Pearl Harbor: Warning and |
|
Decision (1962) |
33. |
Wolfe, James R., Secret Writing: The Craft of the |
|
Cryptographer (1970) |
34. |
Zim, H.S. Codes and Secret Writing (Morrow, 1948) |