Catalog Search Results
Author
Publisher
Bloomsbury Children's Books
Pub. Date
2019.
Language
English
Description
"Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting...
Author
Publisher
Delacorte Press
Pub. Date
c2001
Accelerated Reader
IL: UG - BL: 11.2 - AR Pts: 13
Language
English
Description
Examines the evolution of codes and their impact on history, looking at key turning points in the development of codes, and explains why codes are relevant in the modern world, discussing the role of encryption in everyday life.
Author
Language
English
Formats
Description
The complete untold story of the cracking of the infamous Nazi code
Most histories of the cracking of the elusive Enigma code focus on the work done by the codebreakers at Bletchley Park, Britain's famous World War II counterintelligence station. In this fascinating account, however, we are told, for the first time, the hair-raising stories of the heroic British and American sailors, spies, and secret agents who put their lives on the line to provide...
Author
Accelerated Reader
IL: MG - BL: 6.3 - AR Pts: 1
Language
English
Formats
Description
A picture book biography of Elizebeth Friedman, a brilliant American code breaker who smashed Nazi spy rings, took down gangsters, and created the CIA's first cryptology unit, includes explanations of codes and ciphers and secret messages for young readers to decode.
Author
Language
English
Description
A dual-timeline historical novel of codebreaking, secrets, murder, and romance, set in Hawaii in 1943 and 1965, follows two women--a cryptanalyist working to defeat the Japanese Army, and a rookie journalist investigating the disappearance of a high-profile guest during the grand opening of the Mauna Kea Beach Hotel.
Author
Series
Language
English
Formats
Description
"A hands-on guide to introduce kids to the fascinating world of secret codes and ciphers, CODE CRACKING FOR KIDS explores many aspects of cryptology, including famous people who used and invented codes and ciphers, such as Julius Caesar and Thomas Jefferson; codes used during wars, including the Enigma machine, whose cracking helped the Allies gather critical information on German intelligence in World War II; and work currently being done by the...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Pub. Date
2017.
Language
English
Description
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them.
Author
Language
English
Formats
Description
For Winston Churchill the men and women at Bletchley Park were 'the geese the laid the golden eggs', providing important intelligence that led to the Allied victory in the Second World War. At the peak of Bletchley's success, a total of twelve thousand people worked there of whom more than eight thousand were women. These included a former ballerina who helped to crack the Enigma Code; a debutante working for the Admiralty with a direct line to Churchill;...
Author
Language
English
Formats
Description
Bletchley Park was where one of the war's most famous and crucial achievements was made: the cracking of Germany's "Enigma" code in which its most important military communications were couched. This country house in the Buckinghamshire countryside was home to Britain's most brilliant mathematical brains, like Alan Turing, and the scene of immense advances in technology -- indeed, the birth of modern computing. The military codes deciphered there...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
"Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million.” These basic cybersecurity statistics should alarm everyone. With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of cybersecurity professionals. These are the people responsible...
In Inter-Library Loan Service
Didn't find what you need? Items not owned by Pasco County Library System can be requested from other Inter-Library Loan Service libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try submitting a Purchase Suggestion. Submit Purchase Suggestion