Cryptography
Resource Information
The concept Cryptography represents the subject, aboutness, idea or notion of resources found in Public Libraries of Suffolk County, New York.This resource has been enriched with EBSCO NoveList data.
The Resource
Cryptography
Resource Information
The concept Cryptography represents the subject, aboutness, idea or notion of resources found in Public Libraries of Suffolk County, New York.
This resource has been enriched with EBSCO NoveList data.
- Label
- Cryptography
187 Items that share the Concept Cryptography
Context
Context of CryptographySubject of
No resources found
No enriched resources found
- A course in number theory and cryptography
- trueA signal shattered
- trueA song unheard
- Advanced military cryptography
- trueAlan Turing
- trueAlan Turing : computing genius and wartime code breaker
- trueAlan Turing : the enigma : the book that inspired the film The Imitation Game
- All kinds of codes : by Walt Babson
- Ancient Norse messages on American stones
- Applied cryptography : protocols, algorithms, and source code in C
- trueBabel-17
- trueBattle of wits : the complete story of codebreaking in World War II
- trueBetween silk and cyanide : a codemaker's war, 1941-1945
- Bitcoin : the only complete quick & easy guide to mastering bitcoin and digital currencies ; make more money with bitcoins
- Bitcoin : the ultimate Bitcoin guidebook for beginners
- Break the code : cryptography for beginners
- trueBreak your heart
- trueBreaking secret codes
- trueC
- trueCan you crack the code? : a fascinating history of ciphers and cryptography
- trueCharlie Thorne and the last equation
- trueChester Nez and the unbreakable code : a Navajo code talker's story
- trueCiphers, codes, algorithms, and keys
- Cloak and cipher
- Code breaking : a history and exploration
- trueCode breaking : a history and exploration
- trueCode girls : the true story of the American women who secretly broke codes in World War II
- trueCode girls : the untold story of the American women code breakers who helped win World War II
- trueCode talker
- trueCode talker : [the first and only memoir by one of the original Navajo code talkers of WWII]
- trueCode talker : a novel about the Navajo Marines of World War Two
- trueCode talker : a novel about the Navajo Marines of World War Two
- trueCode warriors : NSA's codebreakers and the secret intelligence war against the Soviet Union
- Codebreaker : the history of codes and ciphers, from the ancient pharaohs to quantum cryptography
- trueCodes and ciphers
- Codes and ciphers : secret writing through the ages
- Codes and ciphers ; : secret writings through the ages
- Codes, ciphers & other cryptic & clandestine communication : making and breaking secret messages from hieroglyphs to the Internet
- trueCodes, ciphers, and cartography : math goes to war
- Codes, ciphers, and other secrets
- Codes, ciphers, and secret writing
- Cracking codes & cryptograms for dummies
- trueCreate your own secret language : invent codes, ciphers, hidden messages, and more : a beginner's guide
- trueCreating and cracking codes
- Cryptanalysis : a study of ciphers and their solution
- Cryptanalysis of the simple substitution cipher with word divisions using non-pattern word lists
- Crypto : how the code rebels beat the government, saving privacy in the digital age
- Crypto : how the code rebels beat the government--saving privacy in the digital age
- Cryptography : InfoSec pro guide
- trueCryptography : the key to digital security, how it works, and why it matters
- Cryptography : the key to digital security, how it works, and why it matters
- Cryptography : the science of secret writing
- Cryptography Engineering : Design Principles and Practical Applications
- Cryptography decrypted
- Cryptography for developers
- Cryptography, a primer
- Cryptological mathematics
- trueCryptology
- Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding and safeguarding, described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public
- trueCryptonomicon
- trueDecoded
- trueDesert dark
- trueDestroy after reading : the world of secret codes
- trueDevils in daylight
- trueDigital fortress
- trueDuke with benefits
- Elementary cryptanalysis : a mathematical approach
- Elementary military cryptography
- Elements of cryptanalys
- trueEmperor
- trueEnigma
- trueEnigma cipher
- trueGlorious boy : a novel
- trueHi tech world : code breakers
- trueHidden codes & grand designs : secret languages from ancient times to modern day
- History of the use of codes
- trueHow I became a spy : a mystery of WWII London
- How to keep a secret : writing and talking in code
- How to write codes and send secret messages
- Implementation of spread spectrum image steganography
- trueIn Farleigh Field : a novel
- In code : a mathematical journey
- Kahn on codes : secrets of the new cryptology
- Loads of codes and secret ciphers
- trueLu & Clancy's secret codes
- trueMaking secret codes
- Manual for the solution of military ciphers
- Manual of cryptography
- trueMaster of darkness
- Mathematical recreations & essays
- Mathematical recreations & essays
- Mathematical recreations & essays
- Mathematical recreations and essays
- Modern cryptanalysis : techniques for advanced code breaking
- trueMourning dove : an Ella Clah novel
- trueMr. Summerling's secret code
- trueMysterious messages : a history of codes and ciphers
- trueNavajo code talkers
- trueNavajo code talkers
- trueNavajo code talkers : Native American heroes
- trueNavajo code talkers : secret American Indian heroes of World War II
- Navajo code talkers : top secret mission
- trueNavajo weapon : the Navajo code talkers
- trueOne to nine : the inner life of numbers
- truePopCo
- truePrison code
- trueRaptor 6
- trueRevenant Sun
- trueRuby Redfort : look into my eyes
- trueSabotage
- trueSecret agent training manual : how to make and break top secret messages
- trueSecret agent y.o.u. : the official guide to secret codes, disguises, surveillance, and more
- Secret and urgent : the story of codes and ciphers
- Secret codes and ciphers
- Secret language
- Secret languages : communicating in codes and ciphers
- Secret messages : concealment, codes, and other types of ingenious communication
- Secret writing ; : the craft of the cryptographer
- Secrets with ciphers and codes : by Joel Rothman and Ruthven Tremain
- trueShadow maker : [a novel]
- trueSherlock Holmes and the American angels : a manuscript believed to be from the pen of John H. Watson
- trueSleeping dragons
- trueSolving Zoe
- trueSpeaking secret codes
- trueSpy codes and ciphers
- trueThe Alexander cipher
- The American black chamber
- trueThe Casanova code
- trueThe Enigma game
- trueThe Führer's reserve : a novel of the FBI
- trueThe Jefferson key
- trueThe Jefferson key : a novel
- trueThe Lincoln myth : a novel
- trueThe Montefeltro conspiracy : a Renaissance mystery decoded
- trueThe National Security Agency : cracking secret codes
- trueThe Navajo code talkers
- trueThe Rose Code
- trueThe Zimmermann telegram
- trueThe bed and the bachelor
- The bitcoin guidebook : how to obtain, invest, and spend the world's first decentralized cryptocurrency
- trueThe book of God and physics : a novel of the Voynich mystery
- trueThe book of God and physics : a novel of the Voynich mystery
- The book of codes : understanding the world of hidden messages : an illustrated guide to signs, symbols, ciphers, and secret languages
- The broken seal : the story of Operation Magic and the Pearl Harbor disaster
- trueThe case of Alan Turing : the extraordinary and tragic story of the legendary codebreaker
- The cat's elbow and other secret languages
- trueThe chaos code
- The code and cipher book
- The code book : how to make it, break it, hack it, crack it
- trueThe code book : how to make it, break it, hack it, crack it
- The codebreakers : the story of secret writing
- trueThe copper scroll
- trueThe copper scroll
- trueThe genius plague
- trueThe haunted lighthouse
- trueThe hunt for the missing spy
- trueThe imitation game : Alan Turing decoded
- The kids' code and cipher book
- trueThe kill order
- trueThe king's deception : a novel
- trueThe king's justice : a Maggie Hope mystery
- trueThe last disciple
- trueThe last sacrifice : Hank Hanegraaff, Sigmund Brouwer
- trueThe last templar
- trueThe lost testament
- trueThe lost treasure of the Templars
- trueThe mummy's curse
- trueThe mystery of the pirate's treasure
- The nature and power of mathematics
- trueThe potato chip puzzles ; : The Puzzling World of Winston Breen
- trueThe puzzling world of Winston Breen
- trueThe secret lives of codebreakers : the men and women who cracked the Enigma code at Bletchley Park
- trueThe secret of the puzzle box
- trueThe secret of the skeleton key
- trueThe secret state : a history of intelligence and espionage
- trueThe sixth day
- trueThe stone child
- The turing guide
- trueTop secret : a handbook of codes, ciphers, and secret writing
- trueTuring's delirium
- trueUnsolved! : the history and mystery of the world's greatest ciphers from ancient Egypt to online secret societies
- trueUnsung heroes of World War II : the story of the Navajo code talkers
- trueUnusual and awesome jobs in math : stunt coordinator, cryptologist, and more
- trueWar of shadows : codebreakers, spies, and the secret struggle to drive the Nazis from the Middle East
- trueWhat could go wrong?
- trueWho broke the wartime codes?
- World War II codebreakers
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.livebrary.com/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.livebrary.com/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.livebrary.com/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.livebrary.com/">Public Libraries of Suffolk County, New York</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Cryptography
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.livebrary.com/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.livebrary.com/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.livebrary.com/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.livebrary.com/">Public Libraries of Suffolk County, New York</a></span></span></span></span></div>