Catalog Search Results
81) Enigma
Author
Publisher
Random House
Pub. Date
1995.
Edition
First U.S. edition.
Physical Desc
320 pages ; 25 cm
Language
English
Author
Pub. Date
2021.
Language
English
Formats
Description
"Decoding the communication of the Nazi high command was imperative for the success of the Allied invasion of Normandy. The Nazi missives were encrypted by the "Tunny" cipher, a code that was orders of magnitude more difficult to crack than the infamous Enigma code. But Tommy Flowers, a maverick English working-class engineer, devised the ingenious, daring, and controversial plan to build a machine that could think at breathtaking speed and break...
Author
Publisher
Packt Publishing
Pub. Date
2019.
Physical Desc
1 online resource (1 streaming video file (2 hr., 49 min., 50 sec.))
Language
English
Description
"Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to...
88) The secret in Building 26: the untold story of America's ultra war against the U-boat Enigma codes
Author
Publisher
Random House
Pub. Date
[2004]
Edition
First edition.
Physical Desc
xxix, 272 pages, 16 unnumbered pages of plates : illustrations ; 25 cm
Language
English
Author
Language
English
Formats
Description
Do you have difficulty implementing application security into your software development processes? Alice and Bob Learn Application Security shows readers how to "push left" in software, by building security considerations into their system development life cycle, right from the start. You'll learn basic security fundamentals and requirements, as well as secure design concepts, all while benefitting from the code, exercises, and examples interspersed...
Series
Publisher
IBM, International Technical Support Organization
Pub. Date
©2011
Physical Desc
1 online resource (xiv, 308 pages) : illustrations.
Language
English
Description
This IBM℗ʼ Redbooks℗ʼ publication provides detailed information about the implementation of hardware cryptography in the System z10℗ʼ server. We begin by summarizing the history of hardware cryptography on IBM Mainframe servers, introducing the cryptographic support available on the IBM System z10, introducing the Crypto Express3 feature, briefly comparing the functions provided by the hardware and software, and providing a high-level overview...
Author
Publisher
CRC Press (an imprint of Taylor & Francis)
Pub. Date
[2013]
Physical Desc
1 online resource (xvi, 212 pages)
Language
English
Description
"For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined...
94) Enigma
Publisher
Columbia TriStar Home Entertainment
Pub. Date
[2002]
Edition
Widescreen edition.
Physical Desc
1 DVD (119 min.) : sound, color ; 4 3/4 in.
Language
English
Description
Still reeling from the disappearance of his lover, a brilliant code-breaker is summoned to Blechley Park, Britain's top-secret intelligence campus. Now he must face his toughest assignment--crack the Nazis' infamous Engima codes. Putting together the pieces of a puzzle, he discovers the reason for his lovers' disappearance to U-boats closing in on Allied cargo ships to a mass grave in Poland.
Author
Series
Publisher
Center for Cryptologic History, National Security Agency
Pub. Date
2011.
Physical Desc
1 online resource (vi, 94 pages) : illustrations.
Language
English
Description
This publication joins two cryptologic history monographs that were published separately in 1989. Part I (German clandestine activites), identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U.S. response to the perceived threat. Part II (The cryptology of the German intelligence services) deals with the cryptographic systems used by the varioius...
97) Doublespeak
Author
Series
Lena Stillman novels volume 2
Publisher
St. Martin's Press
Pub. Date
2019.
Edition
First U.S. edition.
Physical Desc
266 pages ; 22 cm
Language
English
Description
Lieutenant Lena Stillman has been left, nearly alone, on her code-breaking mission in remote Alaska. World War II has been over for a month, but due to crimes committed a lifetime ago, Lena is still under the control of the powerful Miss Maggie. Shaken by her role in the disappearance of Corporal Link Hughes--and by her own misjudgment of his character--Lena yearns for an opportunity to redeem them both. Then she receives a shocking message containing...
Author
Publisher
Alfred A. Knopf
Pub. Date
2016.
Physical Desc
xxi, 389 pages, 16 unnumbered pages of plates : illustrations ; 25 cm
Language
English
Description
"A sweeping history of the NSA and its codebreaking achievements from World War II through the Cold War shares insights into the challenges faced by cryptanalysts and their role in some of the most complicated events of the twentieth century, "--NoveList.
Author
Publisher
CRC Press
Pub. Date
©2013
Physical Desc
1 online resource (xxvi, 355 pages) : illustrations
Language
English
Description
"The new field of optical coding theory helps in designing new classes of optical codes for various coding-based optical applications, such as the well-known optical code division multiple access (CDMA). While there are books on coding theory for wireless communications, there is no book specifically dedicated to optical coding theory. In a clear, concise manner, this book presents the mathematical concepts essential to optical coding theory. It covers...
Author
Publisher
Apress
Pub. Date
[2019]
Physical Desc
1 online resource
Language
English
Description
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase