About this item

As handy and useful as it is to communicate with smartphones, email, and texts, not to mention paying bills and doing banking online, all these conveniences mean that a great deal of our sensitive, personal information needs to be protected and kept secret. Readers can anticipate an intriguing overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep peoples information safe and secure. Examples of how to use some types of cryptography will challenge and intrigue.



About the Author

Laura La Bella

Laura La Bella is a freelance writer and the author or more than 25 nonfiction children's books. She has profiled actress and activist Angelina Jolie in "Celebrity Activists: Angelina Jolie Goodwill Ambassador to the UN"; reported on the declining availability of the world's fresh water supply in "Not Enough to Drink: Pollution, Drought, and Tainted Water Supplies"; and has examined the food industry in "Safety and the Food Supply." La Bella lives in Rochester, N.Y., with her husband and son.



Report incorrect product information.