cryptography

Type: 
Topical Term
Subfield: 
a
Alias: 
cryptography

The code & cipher book

1975
Text and illustrations introduce various codes and ciphers and give examples of their use throughout history.

Spy codes and ciphers

2012
This book discusses different methods of secret communications used by spies, such as Morse code, the Enigma machine, the Navajo language, and digital steganography, as well as career information on espionage.

The Viper's Nest

2010
Amy and Dan travel to a distant land to follow in the footsteps of their most formidable ancestor yet, a military leader who teaches them the art of ancient warfare.

Making secret codes

2011
Discusses different methods for creating secret codes.

Breaking secret codes

2011
Discusses different code-breaking methods and how they have been used throughout history.

The black circle

2009
Siblings Amy and Dan Cahill continue their global search for the clues that will unlock the Cahill family's secret power while also working to evade Irina Spasky.

Codes & ciphers

1995
Readers are challenged to decipher secret messages, coded diary entries, cryptic inscriptions, and mysterious symbols in an attempt to locate a hoarde of lost treasure from the ancient civilization of the Bilongi Islands.

Beyond the grave

2009
Amy and Dan, following a clue found in Book 3, set out to uncover details about the origins of the rivalry between the Tomas and Ekaterina branches of their family, not realizing they are headed right into the hands of the enemy.

Top secret

a handbook of codes, ciphers, and secret writing
2004
Presents a guide to codemaking, codebreaking, and their role in history, describing different types of codes and ciphers, discussing codebreaking and concealment techniques, and including brief stories about exciting moments in the history of the art.

One false note

2008
Amy and Dan Cahill are in the lead to find thirty-nine clues that safeguard a great power, and are in possession of a coded sheet of Mozart's music that will help them find the next clue while their relatives follow in close pursuit. Includes cards.

Pages

Subscribe to RSS - cryptography