cryptography

Type: 
Topical Term
Subfield: 
a
Alias: 
cryptography

The killing code

2022
Kit Sutherland moves to Washington, DC to work as an codebreaker at Arlington Hall, but when she stumbles onto a bloody homicide scene, she joins forces with other girl codebreakers to find the man killing Government girls.

The rose code

a novel
2021
Joining the elite Bletchley Park codebreaking team during World War II, three women from very different walks of life uncover a spy's dangerous agenda years later against the backdrop of the royal wedding of Elizabeth and Philip.

The woman all spies fear

code breaker Elizebeth Smith Friedman and her hidden life
"Biography of Elizebeth Smith Friedman, an American woman who pioneered codebreaking in WWI and WWII but was only recently recognized for her extraordinary contributions to the field"--Provided by publisher.

Classic codes and ciphers

2022
Cryptology is the art and science of secret communication, and its purpose is to protect precious information and keep people safe. Learn about its building blocks: ciphers, codes, and keys.
Cover image of Classic codes and ciphers

Professional cryptologists

2022
Read about the historical code makers and breakers who protected their countries by coding and decoding messages for their governments, and the modern cryptologists who keep emails, texts, and online purchases secure.
Cover image of Professional cryptologists

Secrets of steganography

2022
Steganography is the art of concealing messages in plain sight. Read about invisible inks, the Cardano Grille, the use of microdots in WWI, and the butterfly maps of Lord Baden-Powell.

The woman all spies fear

code breaker Elizebeth Smith Friedman and her hidden life
2021
"Biography of Elizebeth Smith Friedman, an American woman who pioneered codebreaking in WWI and WWII but was only recently recognized for her extraordinary contributions to the field"--Provided by publisher.
Cover image of The woman all spies fear

Who were the Navajo code talkers?

2021
"By the time the United States joined the Second World War in 1941, the fight against Nazi and Axis powers had already been under way for two years. In order to win the war and protect its soldiers, the US Marines recruited twenty-nine Navajo men to create a secret code that could be used to send military messages quickly and safely across battlefields. . . [This book] explains how these brave and intelligent men developed their . . . code, recounts some of their riskiest missions, and discusses how the country treated them before, during, and after the war"--Provided by publisher.
Cover image of Who were the Navajo code talkers?

Using computer science in high-tech security careers

Examines cybersecurity careers, highlighting different jobs, educational requirements, and job search tips.

The maze of bones

Amy and Dan, members of the powerful Cahill family, try to uncover the thirty-nine clues which will reveal the secrets of their lineage and find out what really happened to their parents.

Pages

Subscribe to RSS - cryptography