Catalog Search Results
Author
Publisher
Bloomsbury Children's Books
Pub. Date
2019.
Language
English
Description
"Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting...
Author
Publisher
Odd Dot
Pub. Date
2020.
Language
English
Description
"Communicate in a language only you and your friends can understand! Protect your diary from snooping siblings. Share your secrets with a BFF. Guard your texts from unwanted eyes. Create the lingua franca for your own fantastical secret world! Expert language creator David J. Peterson (inventor of languages for Game of Thrones, the Marvel Universe, and more) guides you as you create your own secret languages, codes, ciphers, and hidden messages. From...
Author
Language
English
Appears on list
Description
"Recruited from small Southern towns and posh New England colleges, 10,000 American women served the U.S. Army and Navy as code breakers during World War II. While their brothers and husbands took up arms, these women moved to Washington and, under strict vows of secrecy, learned the meticulous work of breaking German and Japanese military codes. Poring over reams of encrypted messages, the women worked tirelessly in makeshift facilities in Washington,...
Author
Language
English
Description
Categorical trust in digitality is nirvana for information technology (IT) and operational technology (OT) convergence from device manufacturing to provisioning, commissioning, and field operations in production environments. It may not require expensive hardware upgrades to legacy devices and may be achievable with cost effective software or firmware enhancements, to extend the operational lifetime and efficiency of brownfield and greenfield devices...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
Traces the life of Elizebeth Smith, who met and married groundbreaking cryptologist William Friedman and worked with him to discover and expose Nazi spy rings in South America by cracking multiple versions of the Enigma machine.
"In 1916, a young Quaker schoolteacher and poetry scholar named Elizebeth Smith was hired by an eccentric tycoon to find the secret messages he believed were embedded in Shakespeare's plays. She moved to the tycoon's lavish...
Author
Language
English
Description
"From spy missions to code breaking, this richly illustrated account of the covert operations of World War II takes readers behind the battle lines and deep into the undercover war effort that changed the course of history. From the authors who created Eyewitness to World War II and numerous other best-selling illustrated reference books, this is the shocking story behind the covert activity that shaped the outcome of one of the world's greatest conflicts--and...
Author
Language
English
Description
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers...
Author
Language
English
Description
"Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million.” These basic cybersecurity statistics should alarm everyone. With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of cybersecurity professionals. These are the people responsible...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Language
English
Description
A history of cryptology from its early days in Ancient Egypt, Sparta and Rome to the present day when it has ceased to be a government monopoly and now affects all our lives whenever we use our mobile phones or connect to the internet. Subjects covered here include Mary Queen of Scots' cryptic messages when she was plotting against her cousin Elizabeth I; code-breaking during World Wars I and II including the Enigma Machine and the interception of...
17) Breaking the code: a father's secret, a daughter's journey, and the question that changed everything
Author
Publisher
Sourcebooks
Language
English
Formats
Description
Karen Fisher-Alaniz grew up barely listening to her father's stories of his childhood and of his time in the Navy, but on his 81st birthday, her father gave her two notebooks containing more than 400 pages of letters written to his parents during World War II. It was only then that she discovered the man she never knew and his secret role in the war.
Author
Language
English
Appears on list
Description
Joining the elite Bletchley Park codebreaking team during World War II, three women from very different walks of life uncover a spy's dangerous agenda years later against the backdrop of the royal wedding of Elizabeth and Philip.
1940. As England prepares to fight the Nazis, three very different women answer the call to Bletchley Park, where the best minds in Britain train to break German military codes. Osla puts her fluent German to use as a translator...
Author
Publisher
Blackstone Publishing
Pub. Date
2022
Language
English
Description
"A nonfiction manuscript for young readers about a group of Allied spies and codebreakers that cracked the Nazis's infamous cypher, allowing them to read secret military messages and turn the tide of World War II. During WWII, as the Germans waged war, every Nazi plan, every attack, was sent over radio. But to the Allies listening in, the messages sounded like gibberish. The communications were encoded with a powerful cypher-unless you could unlock...
20) Enigma
Publisher
Columbia TriStar Home Entertainment
Pub. Date
2003
Language
English
Description
Still reeling from the disappearance of his lover, a brilliant code-breaker is summoned to Blechley Park, Britain's top-secret intelligence campus. Now he must face his toughest assignment--crack the Nazis' infamous Engima codes. Putting together the pieces of a puzzle, he discovers the reason for his lovers' disappearance to U-boats closing in on Allied cargo ships to a mass grave in Poland.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request