skip to content
The code book : how to make it, break it, hack it, crack it Preview this item
ClosePreview this item
Checking...

The code book : how to make it, break it, hack it, crack it

Author: Simon Singh
Publisher: New York : Delacorte Press, 2002, ©2001.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
A history of codes and the methodologies for forming and breaking them, from ancient times to modern computers. It's known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history's most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
(DLC) 2001042131
(OCoLC)47141916
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Simon Singh
ISBN: 9780375890123 0375890122
OCLC Number: 441343558
Credits: Machine generated contents note: 1 THE CIPHER OF MARY QUEEN OF SCOTS 5 -- The birth of cryptography, the substitution cipher and -- the invention of codebreaking by frequency analysis --2 THE ANONYMOUS CODEBREAKER 51 -- The Vigenere cipher, why cryptographers seldom get credit -- for their breakthroughs and a tale of buried treasure --3 THE MECHANIZATION OF SECRECY 95 -- The Zimmermann telegram, the Enigma machine -- and how cryptography changed the courses of -- World Wars I and II --4 THE LANGUAGE BARRIER 152 -- The impenetrability of unknown languages, -- the Navajo code talkers of World War II -- and the decipherment of Egyptian hieroglyphs --5 ALICE AND BOB Go PUBLIC 180 -- Modern cryptography, the solution to the so-called -- key-distribution problem and the secret history -- of nonsecret encryption --6 PRETTY GOOD PRIVACY 221 -- The politics of privacy, the future of cryptography -- and the quest for an uncrackable code.
Description: 1 online resource (263 pages) : illustrations
Contents: THE CIPHER OF MARY QUEEN OF SCOTS --
The birth of cryptography, the substitution cipher and the invention of codebreaking by frequency analysis --
THE ANONYMOUS CODEBREAKER --
The Vigenere cipher, why cryptographers seldom get credit for their breakthroughs and a tale of buried treasure --
THE MECHANIZATION OF SECRECY --
The Zimmermann telegram, the Enigma machine and how cryptography changed the courses of World Wars I and II --
THE LANGUAGE BARRIER --
The impenetrability of unknown languages, the Navajo code talkers of World War II and the decipherment of Egyptian hieroglyphs --
ALICE AND BOB Go PUBLIC --
Modern cryptography, the solution to the so-called key-distribution problem and the secret history of nonsecret encryption --
PRETTY GOOD PRIVACY --
The politics of privacy, the future of cryptography and the quest for an uncrackable code.
Responsibility: Simon Singh.
More information:

Abstract:

A history of codes and the methodologies for forming and breaking them, from ancient times to modern computers. It's known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history's most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War, Simon Singh follows the evolution of secret writing. Accessible, compelling, and timely, this international bestseller, now adapted for young people, is sure to make readers see the past-and the future-in a whole new way.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/441343558<\/a>> # The code book : how to make it, break it, hack it, crack it<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"441343558<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Warning: This malformed URI has been treated as a string - \'http:\/\/images.contentreserve.com\/ImageType-100\/0111-1\/{0F225468-B2E5-47A2-8478-5E4B08E82848}Img100.jpg\'<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/652.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/884552<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/866237<\/a>> ; # Coding theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/10792795151#Topic\/business_&_economics_business_writing<\/a>> ; # BUSINESS & ECONOMICS--Business Writing<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/73996990<\/a>> ; # Simon Singh<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2002<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"THE CIPHER OF MARY QUEEN OF SCOTS -- The birth of cryptography, the substitution cipher and the invention of codebreaking by frequency analysis -- THE ANONYMOUS CODEBREAKER -- The Vigenere cipher, why cryptographers seldom get credit for their breakthroughs and a tale of buried treasure -- THE MECHANIZATION OF SECRECY -- The Zimmermann telegram, the Enigma machine and how cryptography changed the courses of World Wars I and II -- THE LANGUAGE BARRIER -- The impenetrability of unknown languages, the Navajo code talkers of World War II and the decipherment of Egyptian hieroglyphs -- ALICE AND BOB Go PUBLIC -- Modern cryptography, the solution to the so-called key-distribution problem and the secret history of nonsecret encryption -- PRETTY GOOD PRIVACY -- The politics of privacy, the future of cryptography and the quest for an uncrackable code.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"A history of codes and the methodologies for forming and breaking them, from ancient times to modern computers. It\'s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history\'s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War, Simon Singh follows the evolution of secret writing. Accessible, compelling, and timely, this international bestseller, now adapted for young people, is sure to make readers see the past-and the future-in a whole new way.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/10792795151<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/47141916<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"The code book : how to make it, break it, hack it, crack it<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"441343558<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/441343558#PublicationEvent\/new_york_delacorte_press_2002_2001<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/10792795151#Agent\/delacorte_press<\/a>> ; # Delacorte Press<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catdir.loc.gov\/catdir\/samples\/random042\/2001042131.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/wilbor.lib.overdrive.com\/ContentDetails.htm?ID=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/stamford.lib.overdrive.com\/ContentDetails.htm?ID=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/ecat.lib.overdrive.com\/ContentDetails.htm?ID=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catdir.loc.gov\/catdir\/toc\/fy031\/2001042131.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/roundrock.lib.overdrive.com\/EE06D323-3706-431C-878F-AA729F98835C\/10\/50\/en\/ContentDetails.htm?id=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/samples.overdrive.com\/?crid=0F225468-B2E5-47A2-8478-5E4B08E82848&.epub-sample.overdrive.com<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> \"http:\/\/images.contentreserve.com\/ImageType-100\/0111-1\/{0F225468-B2E5-47A2-8478-5E4B08E82848}Img100.jpg<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/ebooks.kcls.org\/ContentDetails.htm?ID=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=738723<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.overdrive.com\/search?q=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/archive.org\/details\/codebook00simo_0<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/excerpts.cdn.overdrive.com\/FormatType-410\/0111-1\/0F2\/254\/68\/CodeBookforYoungPeopleHowtoMakeItBrea9780375890123.epub<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780375890123<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/441343558<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> # New York<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"New York<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dewey.info\/class\/652.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/ecat.lib.overdrive.com\/ContentDetails.htm?ID=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"A downloadable eBook accessible through the World Wide Web<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/10792795151#Agent\/delacorte_press<\/a>> # Delacorte Press<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Delacorte Press<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/10792795151#Topic\/business_&_economics_business_writing<\/a>> # BUSINESS & ECONOMICS--Business Writing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"BUSINESS & ECONOMICS--Business Writing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/866237<\/a>> # Coding theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Coding theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/884552<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/roundrock.lib.overdrive.com\/EE06D323-3706-431C-878F-AA729F98835C\/10\/50\/en\/ContentDetails.htm?id=0F225468-B2E5-47A2-8478-5E4B08E82848<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Access digital title<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/73996990<\/a>> # Simon Singh<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Singh<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Simon<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Simon Singh<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780375890123<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0375890122<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780375890123<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/47141916<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/441343558<\/a>> ; # The code book : how to make it, break it, hack it, crack it<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/441343558<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/441343558<\/a>> ; # The code book : how to make it, break it, hack it, crack it<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-12-07<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/441343558#PublicationEvent\/new_york_delacorte_press_2002_2001<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/10792795151#Agent\/delacorte_press<\/a>> ; # Delacorte Press<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2002<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n