You are not connected to the Thomas Jefferson Foundation network. Access to online content and services may require you to authenticate with your library. Proxy Access
Getting this item's online copy...
Find a copy in the library
Getting this item's location and availability...
Find it in libraries globally
|Material Type:||Internet resource|
|Document Type:||Book, Internet Resource|
|All Authors / Contributors:||
|Notes:||Thomas Jefferson Foundation notes:
Story of secret writing
Comprehensive account of what codes and codebreaking have meant in human history, how codes and ciphers were made and broken, and the roles they have played in war, business, diplomacy, and espionage. Contains a new chapter on crytography that makes use of previously classified documents, and explores the myriad ways computer codes and their hackers are changing all of our lives.
A few words -- ch. 1. One day of magic -- The pageant of cryptology : ch. 2. The first 3,000 years -- ch. 3. The rise of the West -- ch. 4. On the origin of a species -- ch. 5. The era of the black chambers -- ch. 6. The contribution of the dilettantes -- ch. 7. Crises of the Union -- ch. 8. The professor, the soldier, and the man on Devil's Island -- ch. 9. Room 40 -- ch. 10. A war of intercepts: I -- ch. 11. A war of intercepts: II -- ch. 12. Two Americans -- ch. 13. Secrecy for sale -- ch. 14. Duel in the ether: the axis -- ch. 15. Duel in the ether: neutrals and allies -- ch. 16. Censors, scramblers, and spies -- ch. 17. The scrutable orientals -- ch. 18. Russkaya Kriptologiya -- ch. 19. N.S.A. -- ch. 20. The anatomy of cryptology -- ch. 21. Heterogeneous impulses -- ch. 22. Rumrunners, businessmen, and makers of non-secret codes -- ch. 23. Ciphers in the past tense -- ch. 24. The pathology of cryptology.
Paracryptology : ch. 25. Ancestral voices -- ch. 26. Messages from outer space -- The new cryptology : ch. 27. Cryptology goes public.
Includes references to Thomas Jefferson's wheel cypher on p. 184, 192-195.
|Description:||xviii, 1181 pages : illustrations ; 25 cm|
|Contents:||One day of magic --
The first 3,000 years --
The rise of the west --
On the origin of a species --
The era of the black chambers --
The contribution of the Dilettantes --
Crises of the union --
The professor, the soldier, and the man on devil's island --
Room 40 --
A war of intercepts: I --
A war of intercepts: II --
Two Americans --
Secrecy for sale --
Duel in the ether: the axis --
Duel in the ether: neutrals and allies --
Censors, scramblers, and spies --
The scrutable orientals --
Russkaya Kriptologiya --
The anatomy of cryptology --
Heterogeneous impulses --
Rumrunners, businessmen, and makers of non-secret codes --
Ciphers in the past tense --
The pathology of cryptology --
Ancestral voices --
Messages from outer space --
Cryptology goes public.
|Other Titles:||Story of secret writing|
|Local System Bib Number:||
Kahn traces history of codes and ciphers from the dawn of civilization and details their influence on war, commerce, diplomacy, and espionage.
Retrieving notes about this item