Catalog Search Results
Author
Description
"A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.
There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament, too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy.
In The Hidden History of Code Breaking, Sinclair McKay explores...
Author
Description
The complete untold story of the cracking of the infamous Nazi code
Most histories of the cracking of the elusive Enigma code focus on the work done by the codebreakers at Bletchley Park, Britain's famous World War II counterintelligence station. In this fascinating account, however, we are told, for the first time, the hair-raising stories of the heroic British and American sailors, spies, and secret agents who put their lives on the line to provide...
Author
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Description
The Code Busters are competing in their school's science fair, but when a mysterious drone ruins their project, it is up to sixth grader Cody and her friends to figure out who is responsible. Back matter includes keys to the codes and solutions to the coded messages that appear throughout the text.
Author
Description
In this picture book biography, young readers will learn all about Elizebeth Friedman (1892-1980), a brilliant American code breaker who smashed Nazi spy rings, took down gangsters, and created the CIA's first cryptology unit. Her story came to light when her secret papers were finally declassified in 2015. From thwarting notorious rumrunners with only paper and pencil to "counter-spying into the minds and activities of" Nazis, Elizebeth held a pivotal...
12) The black circle
Author
Formats
Description
Where are Amy and Dan Cahill? The two kids were last seen in Egypt, hunting for one of the 39 Clues that could make them the most powerful people on earth. But no one has seen the siblings since. Has the ruthless Irina Spasky finally tracked them down? Or worse ... the Madrigals?
Author
Description
Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand...
Author
Description
Build distributed applications that resolve data ownership issues when working with transactions between multiple parties
Blockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders. With the help of Introduction to Blockchain and Ethereum, you'll learn how to create distributed Blockchain applications which do not depend on a central server or datacenter. The course begins by explaining Bitcoin,...
Author
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Description
Learn how real-life hackers and pentesters break into systems.
Book Description
Discover the essential tools and insights to safeguard your digital assets with the "Ultimate Pentesting for Web Applications". This essential resource comprehensively covers ethical hacking fundamentals to advanced testing methodologies, making it a one-stop resource for web application security knowledge.
Delve into the intricacies of security testing in web applications,...
Author
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Description
Bei der heutigen Datenflut, die auf Speichermedien und im Internet kursiert, ist die Kompression digitaler Daten nach wie vor ein immens wichtiger Aspekt bei Datenübertragung und -speicherung. Dieses essential erläutert ohne theoretischen Überbau und mit elementaren mathematischen und informatischen Methoden die wichtigsten Kompressionsverfahren, so unter anderem die Entropiecodierungen von Shannon-Fano und von Huffman, sowie die Wörterbuchcodierungen...
19) Cryptonomicon
Author
Formats
Description
More than fifty years after Lawrence Pritchard Waterhouse and Sergeant Bobby Shaftoe are assigned to Detachment 2702, a secret cryptographic mission, their grandchildren--Randy and Amy--join forces to create a "data haven" in the South Pacific, only to uncover a massive conspiracy with roots in Detachment 2702.
Author
Description
One of the most influential struggles of World War II was fought behind the scenes, the battle for intelligence. Enormous resources were devoted to breaking the enemy's code, a feat that could decide the outcome of a battle. Among the reasons for the allied triumph is the creation of a code based on the Navajo language, a code that was never broken. This is the story of how these code talkers lived, worked, and ultimately influenced World War II.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request