Catalog Search Results
Author
Publisher
No Starch Press
Pub. Date
[2023]
Language
English
Description
"Teaches how to break encrypted texts, whether by hand or using free computer tools. Covers specific cryptographic techniques and includes real-life examples of encrypted text, from modern postcards to nineteenth-century newspaper ads, telegrams, notes smuggled into prisons, and entire encrypted books"--
Author
Pub. Date
2017.
Language
English
Description
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them.
Author
Publisher
Dutton Children's Books
Pub. Date
c2009
Accelerated Reader
IL: MG - BL: 9.5 - AR Pts: 5
Language
English
Description
From the ingenious ciphers of Italian princes to the spy books of the Civil War to the advanced techniques of the CIA, codes and code breaking have played important roles throughout history.
Author
Publisher
Odd Dot
Pub. Date
2020.
Language
English
Description
"Communicate in a language only you and your friends can understand! Protect your diary from snooping siblings. Share your secrets with a BFF. Guard your texts from unwanted eyes. Create the lingua franca for your own fantastical secret world! Expert language creator David J. Peterson (inventor of languages for Game of Thrones, the Marvel Universe, and more) guides you as you create your own secret languages, codes, ciphers, and hidden messages. From...
Author
Publisher
Weinstein Books
Pub. Date
[2017].
Language
English
Description
"Want to learn how to make and break top secret messages like a real spy? IF so, this is the book for you! Inside are more than 80 pages of tips, tricks, and practice exercises for writing and deciphering cryptic communications. You'll learn how to make your own invisible ink, hide your messages, create unbreakable ciphers, and craft your own decoder gadgets. You can use this manual to learn how to exchange top secret notes with friends"--Page [4]...
Author
Language
English
Formats
Description
An American computer hacker operating in Southeast Asia attempts to break a World War II cypher to find the location of a missing shipment of gold. The gold was stolen by the Japanese during the war. Bouncing between World War II and the World Wide Web, Cryptonomicon follows the exploits of Lawrence Waterhouse, a young mathematical genius assigned to a highly secretive outfit that has cracked the fabled Nazi enigma code.
Author
Accelerated Reader
IL: MG - BL: 6.3 - AR Pts: 1
Language
English
Formats
Description
In this picture book biography, young readers will learn all about Elizebeth Friedman (1892-1980), a brilliant American code breaker who smashed Nazi spy rings, took down gangsters, and created the CIA's first cryptology unit. Her story came to light when her secret papers were finally declassified in 2015. From thwarting notorious rumrunners with only paper and pencil to "counter-spying into the minds and activities of" Nazis, Elizebeth held a pivotal...
Publisher
PBS Distribution
Pub. Date
[2021]
Language
English
Description
It tells the fascinating story of Elizebeth Smith Friedman, the groundbreaking cryptanalyst whose painstaking work decoding thousands of messages for the U.S. government would send infamous gangsters to prison and bring down a massive, near-invisible Nazi spy ring in WWII. A suburban wife and mother who led a secret double life, her remarkable contributions to the science of cryptology would only come to light decades after her death when classified...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Language
English
Description
Categorical trust in digitality is nirvana for information technology (IT) and operational technology (OT) convergence from device manufacturing to provisioning, commissioning, and field operations in production environments. It may not require expensive hardware upgrades to legacy devices and may be achievable with cost effective software or firmware enhancements, to extend the operational lifetime and efficiency of brownfield and greenfield devices...
Author
Language
English
Description
Are you curious about the history and evolution of Bitcoin and other cryptocurrencies? Do you want to learn how they work and what they mean for the world of money and technology? Do you want to discover the social, economic, and political implications of cryptocurrencies for individuals, groups, organizations, and nations?If you answered yes to any of these questions, then this book is for you. In this book, you will find an informative and comprehensive...
Author
Language
Deutsch
Description
Viren, Würmer, Trojanische Pferde, das Arsenal der Hackerangriffe auf IT-Infrastrukturen scheint unerschöpflich. Nachdem Computerwurm Stuxnet 2010 das Steuerungssystem eines iranischen Atomkraftwerks befallen hatte und Computer durch die Malware Flame ferngesteuert und ausspioniert wurden, sorgte 2015 ein Virus namens Duqu 2.0 für Schlagzeilen, weil er die IT von Unternehmen in Europa, Asien und den USA infiziert hatte. Was aber wenn Computer grundsätzlich...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Language
English
Description
"Blockchain Technology: Mastering the Digital Ledger Revolution"Embark on a transformative journey with "Blockchain Technology: Mastering the Digital Ledger Revolution," a comprehensive guide that demystifies the complex world of blockchain technology. This book is tailored for a diverse audience, from beginners curious about the basics to professionals looking to deepen their expertise in this rapidly evolving field.Inside the Book:Understanding...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request