Catalog Search Results
Author
Publisher
Candlewick Press
Accelerated Reader
IL: MG - BL: 7.3 - AR Pts: 3
Language
English
Description
Presents a guide to codemaking, codebreaking, and their role in history, describing different types of codes and ciphers, discussing codebreaking and concealment techniques, and including brief stories about exciting moments in the history of the art.
Author
Language
English
Description
Traces the life of Elizebeth Smith, who met and married groundbreaking cryptologist William Friedman and worked with him to discover and expose Nazi spy rings in South America by cracking multiple versions of the Enigma machine.
"In 1916, a young Quaker schoolteacher and poetry scholar named Elizebeth Smith was hired by an eccentric tycoon to find the secret messages he believed were embedded in Shakespeare's plays. She moved to the tycoon's lavish...
Author
Series
Language
English
Formats
Description
"A hands-on guide to introduce kids to the fascinating world of secret codes and ciphers, CODE CRACKING FOR KIDS explores many aspects of cryptology, including famous people who used and invented codes and ciphers, such as Julius Caesar and Thomas Jefferson; codes used during wars, including the Enigma machine, whose cracking helped the Allies gather critical information on German intelligence in World War II; and work currently being done by the...
Author
Series
Accelerated Reader
IL: MG - BL: 5.3 - AR Pts: 7
Language
English
Formats
Description
Thirteen-year-old Dan Cahill and his older sister, Amy, thought the search for the thirty-nine clues leading to the source of their family's power was over, but when Cahills are kidnapped by the Vespers, Amy and Dan find themselves with only a few day to fulfill a bizarre ransom request before their friends start dying.
Author
Language
English
Description
"1943. As war in the Pacific rages on, Isabel Cooper and her codebreaker colleagues huddle in "the dungeon" at Station HYPO in Pearl Harbor, deciphering secrets plucked from the airwaves in a race to bring down the enemy. Isabel has only one wish: to avenge her brother's death. But she soon finds life has other plans when she meets his best friend, a hotshot pilot with secrets of his own. 1965. Fledgling journalist Lu Freitas comes home to Hawai'i...
Author
Series
Accelerated Reader
IL: MG - BL: 4.2 - AR Pts: 6
Language
English
Formats
Description
Thirteen-year-old Dan Cahill and his older sister Amy race against time to find an ancient map that has not been seen for half a century and use it to redeem their family members who have been kidnapped by a sinister organization called the Vespers.
10) One false note
Author
Series
The 39 clues. Main series volume 2
Accelerated Reader
IL: MG - BL: 4.9 - AR Pts: 5
Language
English
Description
Amy and Dan Cahill are in the lead to find thirty-nine clues that safeguard a great power, and are in possession of a coded sheet of Mozart's music that will help them find the next clue while their relatives follow in close pursuit. Does not include game cards.
Author
Publisher
Pegasus Books
Pub. Date
2015.
Language
English
Description
A startling and vivid account of World War I that uncovers how wartime code-breaking, aeronautics, and scientific research that laid the foundation for much of the innovations of the twentieth century.
World War I is often viewed as a war fought by armies of millions living and fighting in trenches, aided by brutal machinery that cost the lives of many. But behind all of this an intellectual war was also being fought between engineers, chemists, code-breakers,...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
Deutsch
Description
Viren, Würmer, Trojanische Pferde, das Arsenal der Hackerangriffe auf IT-Infrastrukturen scheint unerschöpflich. Nachdem Computerwurm Stuxnet 2010 das Steuerungssystem eines iranischen Atomkraftwerks befallen hatte und Computer durch die Malware Flame ferngesteuert und ausspioniert wurden, sorgte 2015 ein Virus namens Duqu 2.0 für Schlagzeilen, weil er die IT von Unternehmen in Europa, Asien und den USA infiziert hatte. Was aber wenn Computer grundsätzlich...
Author
Language
English
Description
Are you curious about the history and evolution of Bitcoin and other cryptocurrencies? Do you want to learn how they work and what they mean for the world of money and technology? Do you want to discover the social, economic, and political implications of cryptocurrencies for individuals, groups, organizations, and nations?If you answered yes to any of these questions, then this book is for you. In this book, you will find an informative and comprehensive...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
19) CBSA Certified Blockchain Solution Architect Exam Practice Test and Dumps CBSA Blockchain Exam Guide
Author
Language
English
Description
Certified Blockchain Solution Architect (CBSA) is a professional certification designed for individuals seeking to validate their expertise in designing and implementing blockchain solutions. This credential, offered by the Blockchain Training Alliance, certifies that the holder has a deep understanding of blockchain technology, including the ability to architect and design blockchain-based systems, assess the technical requirements of a project,...
Author
Accelerated Reader
IL: MG - BL: 6.4 - AR Pts: 9
Language
English
Formats
Description
After being taught in a boarding school run by whites that Navajo is a useless language, Ned Begay and other Navajo men are recruited by the Marines to become Code Talkers, sending messages during World War II in their native tongue.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request