bk AHC: Content

An excerpt from the book Advanced Handwriting Cryptography
[ full book.. sellfy.com/p/ujMc , free examples.. sellfy.com/p/HQH3 ].

here’s the content of the book Advanced Handwriting Cryptography:

1 Introduction.
2 A bit of history.
3 Why handwriting?
4 Relevance.
5 The method.
5.1 Getting an idea.
5.2 Seeking the information.
5.3 Learning all the details.
5.4 Working on your own.
6 Basic principles of handwriting encryption.
7 Techniques of encryption.
7.1 Confusion / substitution.
7.1a Information carriers.
7.1b Noise and distraction elements.
7.2 Diffusion / transposition.
7.3 Other techniques.
7.3a Data points method.
7.3b Mathematical method.
7.3c Art method.
7.3d Hiding method.
7.4 Writing styles.
7.5 Using switches.
8 Encryption symbols.
8.1 Base hieroglyphs.
8.2 Characters.
8.3 Additional signs.
9 Lists of symbols.
9.1 Classic text symbols (TS).
9.1a Alphabets.
9.1b Numerals.
9.1c Mathematical symbols.
9.1d Other symbols.
9.1e Highlighting and more.
9.2 Cryptic symbols (CS).
9.2a Diffusion symbols.
9.2b Correction symbols.
9.2c Assisting symbols.
9.2d Modifiers.
9.2e Switches.
9.2f Other tools.
10 How complex code is good enough?
11 Systematization and memorizing.
12 Sharing and personalization .
12.1 Sharing with one person.
12.2 Sharing with several people.
12.3 Temporary sharing.
12.4 Urgent sharing.
12.5 Key delivery.
13 Securing the method for recovery.
13.1 Recovery of encryption method.
13.2 Recovery of encrypted data.
14 For developers.
15 Application.
16 Example of glyph parts.
17 Examples of code creation.
17.1 Basic code.
17.2 Medium level code.
17.2a Matrix of symbols.
17.2b Encryption symbols.
17.2c The creation process.
17.2d Description of rules.
17.2d – 01 Basic rules of the code.
17.2d – 02 Base cryptic symbols (BCS).
17.2d – 03 Attached cryptic symbols (ACS).
17.2d – 04 Separate cryptic symbols (SCS).
17.2d – 05 Creating additional rules.
17.2e Writing sample.
18 Exercises.
18.1 Attention exercises.
18.2 Drawing exercises.
19 Commercial uses of the cryptography method.
19.1 Cryptic messages project.
19.1a Guessing of messages.
19.1b Creating a lottery.
19.1c Promotional ads.
19.2 Cryptic signatures.
19.3 Cryptic orders.
19.4 Other commercial uses.
20 Writing music.
21 Advanced games for training.
22 Cryptography in social life.
23 Cryptography in gambling.
24 The highest level method.
25 Work on the book.
26 Future of the method.
26.1 Writing without encryption.
26.2 Encoding without hieroglyphs.
26.3 About the next challenge.
27 Artwork.
28 To print / copy.
29 Get in touch.
30 Legal notice.
31 Content.



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s