| 1. |
Albert, Burton, Jr. Codes for Kids (Whitman, 1976) |
| 2. |
Albert, Burton, Jr. More Codes for Kids |
| |
(Whitman, 1979) |
| 3. |
B.Beckett. Introduction to cryptology (Blackwell |
| |
Scientific Publications, 1988) |
| 4. |
Babson, Walt. All Kinds of Codes (Scholastic, 1976) |
| 5. |
Barker, Wayne G., Manual of Cryptography (1981) |
| 6. |
Ban-on, John, KGB: The Secret Work of Soviet |
| |
Secret Agents (1973) |
| 7. |
Brassaid G. Modem Kryptology. Springer-Veriag (1988) |
| 8. |
Bruce Schneier, "Applied Cryptography: Protocols, |
| |
Algorithms, and Source Code in C", John Wiley & |
| |
Sons (1993) |
| 9. |
Clark, R.W. The Man Who Broke Purple: A Life |
| |
of the World's Greatest Cryptologist, Colonel |
| |
William F. Friedman (Little, 1977) |
| 10. |
Banning, Dorothy E., Cryptography and |
| |
Protection (1982) |
| II. |
Dulles, Alien A., The Craft of Intelligence (1963) |
| 12. |
Friedman, W.F., Elements ofCryptanalysis (1976) |
| 13. |
Gardner, Martin, Codes, Ciphers, and Secret |
| |
Writing (1984) |
| 14. |
Gleason, Norma. Cryptograms and Spygrams |
| |
(Dover, 1981) |
| 15. |
Harris, Christopher, et al., Hazardous Waste: |
| |
Confronting the Challenge (1987) |
| 16. |
Kahn, David, Kahn on Codes (Macrnillan, 1983) |
| 17. |
Kahn, David. Kahn on Codes: New Secrets of |
| |
Cryptology (Macrnillan, 1983) |
| 18. |
Kahn, David. The Codebreakers: The Story of |
| |
Secret Writing (Macrnillan, 1967) |
| 19. |
Konheim, A.G. Cryptography: A Primer (Wiley, 1981) |
| 20. |
Laflin, John. Codes and Ciphers: Secret Writing |
| |
Through the Ages (Harper, 1964) |
| 21. |
Landreth, Bill, A Hacker's Guide to Computer |
| |
Security, (Microsoft Press, 1985) |
| 22. |
Levy, Steven. Hackers: Heroes of the Computer |
| |
Revolution. (Doubleday, 1984) |
| 23. |
Lysing, Henry. Secret Writing: An Introduction to |
| |
Cryptograms, Ciphers, and Codes (Dover, 1974) |
| 24. |
Mayer, Carl, and Matyas, Stephen, Cryptography: |
| |
New Dimensions in Computer Security (1982) |
| 25. |
Parker, Donn B. Crime By Computer. (Charles |
| |
Scribner's Sons, 1976) |
| 26. |
Pierce, С. C" Crypto-privacy (1988) |
| 27. |
Sarnoff, Jane and Ruffins, Reynold. The Code and |
| |
Cipher Book (Scribner, 1975) |
| 28. |
Seberry J., Pieprzyk J., Cryptography. An intro- |
| |
duction to computer security. (Prentice Hall, 1989) |
| 29. |
Sinkov, Abraham, Cryptanalysis: A Mathematical |
| |
Approach (1980) |
| 30. |
Smith, L.D. Cryptography: The Science of Secret |
| |
Writing (Dover, 1955) |
| 31. |
Wmterbotham, Frederick W., The Ultra Secret (1982) |
| 32. |
Wohlstetter, Roberta, Pearl Harbor: Warning and |
| |
Decision (1962) |
| 33. |
Wolfe, James R., Secret Writing: The Craft of the |
| |
Cryptographer (1970) |
| 34. |
Zim, H.S. Codes and Secret Writing (Morrow, 1948) |