Ciphers, Codes, Algorithms, and Keys (17)
As handy and useful as it is to communicate with smartphones, email, and texts, not to mention paying bills and doing banking online, all these conveniences mean that a great deal of our sensitive, personal information needs to be protected and kept secret. Readers can anticipate an intriguing overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep peoples' information safe and secure. Examples of how to use some types of cryptography will challenge and intrigue.
-
SeriesCryptography: Code Making and Code Breaking
-
ManufacturerRosen and PowerKids
-
PublisherRosen Young Adult
-
Publisher or imprintRosen Young Adult
-
AuthorBella, Laura La
-
ISBN-13978-1-5081-7306-9
-
FormatReinforced Library Binding
-
Size6 1/2" x 9 1/4"
-
Reading Interest7,8,9,10,11,12
-
# of Pages64
-
Dewey Decimal005.8/2--dc23
-
Guided Reading LevelZ
-
Date Published2017
As handy and useful as it is to communicate with smartphones, email, and texts, not to mention paying bills and doing banking online, all these conveniences mean that a great deal of our sensitive, personal information needs to be protected and kept secret. Readers can anticipate an intriguing overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep peoples' information safe and secure. Examples of how to use some types of cryptography will challenge and intrigue.