Catalog Search Results
Author
Series
Robert Langdon novels volume 2
Language
English
Appears on list
Description
Harvard symbologist Robert Langdon and French cryptologist Sophie Neveu work to solve the murder of an elderly curator of the Louvre, a case which leads to clues hidden in the works of Da Vinci and a centuries-old secret society.
Author
Language
English
Description
A former National Security Agency programmer threatens to release a mathematical formula that will allow organized crime and terrorism to skyrocket, unless the code-breaking computer that is used to keep them in check--but that violates civil rights--is not exposed to the public.
3) Fatal code
Author
Series
Snap Agency volume 2
Language
English
Formats
Description
"In the global race for space domination, a cryptologist must overcome his greatest mistake to help the granddaughter of a nuclear physicist decipher the clues to a top secret nuclear project before it falls into the hands of America's enemies"--
Author
Series
Pub. Date
2016.
Language
English
Description
England, 1942. The Nazis relentless Blitz may have paused, but London's nightly blackouts continue. Now, under the cover of darkness, a madman is brutally killing and mutilating young women in eerie and exact re-creations of Jack the Ripper's crimes. What's more, he's targeting women who are reporting for duty to be Winston Churchill's spies and saboteurs abroad. The officers at MI-5 quickly realize they need the help of special agent Maggie Hope...
Author
Language
English
Description
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better...
Author
Series
Language
English
Description
Maggie Hope, travels across the pond to America, where a looming scandal poses a grave threat to the White House and the Allied cause. December 1941. Soon after the attack on Pearl Harbor, Winston Churchill arrives in Washington, D.C., along with special agent Maggie Hope. Posing as his typist, she is accompanying the prime minister as he meets with President Roosevelt to negotiate the United States' entry into World War II. When one of the First...
7) Speakeasy
Author
Series
Lena Stillman novels volume 1
Pub. Date
2018.
Language
English
Formats
Description
"In this literate and action-packed historical thriller, set during World War II, a plucky code-breaker fights to keep a deadly secret as her Bonnie-and-Clyde past threatens to catch up with her. Thirty-year-old Lena Stillman is living a perfectly respectable life when a shocking newspaper headline calls up her past: it concerns her former lover, charismatic bank robber Bill Bagley. A romantic and charming figure, Lena had tried to forget him by resuming...
Author
Publisher
Packt Publishing
Pub. Date
2019.
Physical Desc
1 online resource (1 streaming video file (2 hr., 49 min., 50 sec.))
Language
English
Description
"Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to...
Author
Publisher
Apress
Pub. Date
[2021]
Physical Desc
1 online resource
Language
English
Description
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography. Modern cryptography is the lifeboat of a secure infrastructure. From global economies and governments, to meeting everyday consumer needs,...
Author
Publisher
Apress
Pub. Date
[2021]
Physical Desc
1 online resource
Language
English
Description
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented...
Author
Publisher
Apress
Pub. Date
2021
Physical Desc
1 online resource
Language
English
Description
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB. Cryptography...
14) LTE Security
Publisher
John Wiley & Sons
Pub. Date
2010
Physical Desc
1 online resource (304)
Language
English
Author
Series
Language
English
Description
World War II is raging, and former spy Maggie Hope knows too much. She knows what the British government is willing to do to keep its secrets. She knows the real location of the planned invasion of France. She knows who's lying. She knows who the double-crossers are. She knows exactly who is sending agents to their deaths. These are the reasons Maggie is isolated on a remote Scottish island, in a prison known as Killoch Castle, out of contact with...
Author
Publisher
linkedin.com
Pub. Date
2022.
Language
English
Description
Learn how to secure sensitive information with Azure Key Vault.
Do you need to learn how to manage sensitive information for your applications and services? In this course, instructor Nertil Poci shows you how to secure sensitive information with Azure Key Vault. Nertil explains what Azure Key Vault does, then goes over creating Key Vaults, setting up your project dependencies, and securely accessing information stored in Key Vaults. He covers a...
Author
Publisher
linkedin.com
Pub. Date
2022.
Language
English
Description
Get the detailed info you need to prepare for the Cloud Data Security domain of the CCSP exam. The course is mapped to the objectives used in the August 2022 exam release.
Are you a cybersecurity or cloud computing professional preparing for the Cloud Data Security domain of the CCSP exam? In this course, Mike Chapple presents the detailed information you need, using the objectives that will be reflected in the August 2022 exam release. This course...
18) Doublespeak
Author
Series
Lena Stillman novels volume 2
Publisher
St. Martin's Press
Pub. Date
2019.
Edition
First U.S. edition.
Physical Desc
266 pages ; 22 cm
Language
English
Description
Lieutenant Lena Stillman has been left, nearly alone, on her code-breaking mission in remote Alaska. World War II has been over for a month, but due to crimes committed a lifetime ago, Lena is still under the control of the powerful Miss Maggie. Shaken by her role in the disappearance of Corporal Link Hughes--and by her own misjudgment of his character--Lena yearns for an opportunity to redeem them both. Then she receives a shocking message containing...
Author
Series
Pub. Date
2017
Language
English
Description
Maggie Hope has come a long way since serving as a typist for Winston Churchill. Now she's working undercover for the Special Operations Executive in the elegant but eerily silent city of Paris, where SS officers prowl the streets in their Mercedes and the Ritz is draped with swastika banners. Walking among the enemy is tense and terrifying, and even though she's disguised in chic Chanel, Maggie can't help longing for home. But her missions come first....
Publisher
Packt Publishing
Pub. Date
2023.
Edition
[First edition].
Physical Desc
1 online resource (1 video file (26 hr., 22 min.)) : sound, color.
Language
English
Description
"Mastering CASP+ Security Architecture and Operations"" is an extensive course designed for professionals seeking to deepen their knowledge in advanced security concepts and prepare for the CASP+ exam. The course journey begins with a thorough exploration of Security Architecture, covering crucial topics like network services, segmentation, and Zero Trust models, to build a robust security foundation. As you progress, you'll delve into Security Operations,...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase