Página inicialGruposDiscussãoMaisZeitgeist
Pesquise No Site
Este site usa cookies para fornecer nossos serviços, melhorar o desempenho, para análises e (se não estiver conectado) para publicidade. Ao usar o LibraryThing, você reconhece que leu e entendeu nossos Termos de Serviço e Política de Privacidade . Seu uso do site e dos serviços está sujeito a essas políticas e termos.

Resultados do Google Livros

Clique em uma foto para ir ao Google Livros

Carregando...

Codes, Ciphers and Other Cryptic and Clandestine Communication: 400 Ways to Send Secret Messages from Hieroglyphs to the Internet (1998)

de Fred B. Wrixon

MembrosResenhasPopularidadeAvaliação médiaMenções
581341,404 (3.76)1
An alphabetical exploration of the world of codes and ciphers and significant individuals involved in that field.
Nenhum(a)
Carregando...

Registre-se no LibraryThing tpara descobrir se gostará deste livro.

Ainda não há conversas na Discussão sobre este livro.

» Ver também 1 menção

Exibindo 3 de 3
This book is so big, heavy, and awkward, it will kill me to read it whenever I actually feel up to it.
  Chica3000 | Dec 11, 2020 |
Indeholder "Acknowledgements", "Cryptology: From Hieroglyphs to the Internet", " The Beginnings of Cryptology", " The Renaissance", " Monarchies and Revolution", " The Mechanical Age", " The First World War", " The 1920s and 1930s", " The Second World War", " Naval Battles", " Espionage and Counterespionage", " The Postwar Era: Spies and Security", " The Race for Technology", " The New Cryptology: Public and Private Security Issues", "Ciphers", " Transposition Ciphers", " Reverse Transposition", " Reverse Variations", " Geometric Ciphers", " Route Transpositions", " Rail Fence", " Variations on the Rail Fence", " Horizontal Routes", " Alternate Horizontals", " Vertical Routes", " Alternate Verticals", " Diagonal Routes", " Alternate Diagonals", " Clockwise Routes", " Counterclockwise Routes", " Columnar Transposition", " Interrupted Columnar", " Diagonal Columnar", " Double Columnar", " Four Corner Transposition", " Triangle and Trapezoid Transpositions", " Word Transposition", " Substitution Ciphers", " Monoalphabetic Substitution", " Shift Ciphers", " Shift Cipher with Keyword", " Keyphrase Ciphers", " Random Substitution Ciphers", " Charlemagne's Cipher", " Zodiac Cipher", " Mary Queen of Scots Cipher", " Chevalier de Rohan's Cipher", " Rose Greenhow's Cipher", " Edgar Allan Poe's 'Gold Bug' Cipher", " Sherlock Holmes 'Adventures of the Dancing Men' Cipher", " The Shadow's Ciphers", " Geometric Ciphers", " Rosicrucian Cipher", " Freemason's Cipher", " Alphanumeric Ciphers", " Franklin-Dumas Cipher", " 'The Man from Scotland Yard' Cipher", " Multiliteral Forms", " Polybius Checkerboard", " Elizabeth Van Lew's Cipher", " Knock Cipher", " Multiliteral Variations", " Multiple Equivalents", " Variants", " Multiliteral Ciphers with Keyword", " Multiliteral Tables", " Russian Nihilist Cipher", " Straddling Checkerboard", " Polyalphabetic Substitution", " Disks", " Alberti's Disk", " Porta's Disk", " Tableux", " Trithemius's Tabula Recta", " Vigenere's Table", " Key Progression", " Marie Antoinette's Cipher", " Variations of Vigenère's Table", " Gronsfeld Cipher", " Beaufort Cipher", " Polygraphic Ciphers", " Porta's Digraphic Cipher", " Playfair Cipher", " Two-square Cipher", " Four-Square Cipher", " Trigraphic Ciphers", " Algebraic Ciphers", " Fractionating Ciphers", " Aperiodic Fractionating Ciphers", " Periodic Encipherment", " Tripartite Fractionating Ciphers", " Bifid Cipher", " ADFGX", " ADFGVX", " Cipher Devices and Machines", " Cipher Devices", " Thomas Jefferson's Wheel Cypher", " Wadsworth's Device", " Wheatstone's Cryptograph", " Saint-Cyr Slide", " Cylindrical Cryptograph", " Pletts's Device", " M-138 And M-138A", " M-94", " Advancements in Cipher Machines", " M-209", " Electrically Wired Rotors", " Edward Hebern's Electric Code Machine", " Elecronic cipher machine (ECM) and ECM Mark II", " Sigaba", " Enigma", " Typex", " Colossus", " Red", " Alphabetical Typewriter '97 And The Purple Analog", " Unbreakable Ciphers", " Baudot Code/Vernam Cipher", " Mauborgne's One-Time System", " One-Time Pads", " VIC Cipher", " Computer Cryptography", " Data Encryption Standard", " Two-Key Cryptography", " RSA Cryptoalgorithm", " Authentication", " Key Generation", " Quantum Cryptography", " Fundamentals of Quantum Computation", " Quantum Cryptography", " Cryptanalysis", " Cryptanalytic Techniques", " Hints For Breaking Polyalphabetic Ciphers", "Codes", " Nomenclators", " How To Make A Nomenclator", " Benjamin Tallmadge's Nomenclator", " XYZ Nomenclator", " James Madison's Nomenclators", " Book Codes", " How To Make A Book Code", " Benedict Arnold's Book Code", " Nicholas Trist's Book Code", " Presidential Election of 1876", " Codebooks", " How To Make A One-Part Code", " How To Make A Two-Part Code", " Early State Department Codes", " State Department Code of 1867", " Chief Signal Officer's Code (Circa 1871)", " The Cipher of the Department of State (1876)", " The Cipher of the Deparmtent of State (1899)", " Green Cipher", " Codes in World War I", " Zimmermann Telegram", " American Trench Code", " The River Series: Potomac", " The River Series: Mohawk", " Telephone Code", " The Lake Series: Champlain", " The Lake Series: Huron", " American Radio Service Code No. I", " Choctaw 'Codetalkers'", " Commercial Codes", " The Slater Code", " The Acme Code", " Murray Teleprinter Process", " Q Code", " Pre-World War II Codes", " Gray Code", " Department of State Code A-1", " Brown Code", " World War II Codes", " Black Code", " Merchant Ships' Code", " The "J" Series", " JN25", " Native American 'Codetalkers'", " Quadratic Code", " Codes In Everyday Life", " Universal Product Code (UPC)", " Zip Code", " ASCII", " Banking Security Codes", " Genetic Code", " Codebreaking", " Breaking Enciphered Codes", " Signals", " Hand and Arm Signals", " Naval Flaghoist Signals", " Hand-Held Signaling Systems: Flags, Disks and Torches", " Light Signals", " Constant Illumination Signals", " Pyrotechnic and Chronosemic Systems", " Reflected and Flashed Light", " Mechanical Signaling Systems", " Hand-Held Semaphore", " Technical Advancemenets", " The Electronic War Zone: Signals Security and Signals Intelligence", " Steganography", " Technical Methods of Concealment", " Invisible Inks", " How to Make an Invisible Ink", " Cryptophotographic Techniques", " Microdots", " Linguistic Concealments", " Semagrams", " Semagrams in Writing", " Grilles", " Null Ciphers", " Jargon Codes", " Modern Transmissions Security", " Laser And Infrared Technology", " Pulse Code Modulation", " Burst/Spurt Transmissions", " Spread Spectrum", " Scripts & Languages", " Protowriting", " Solved Scripts", " Deciphering an extinct script", " Cuneiform", " Decryption", " Egyptian Hieroglyphs", " Decryption", " Hittite Cuneiform and Hieroglyphs", " Decryption", " Linear B", " Decryption", " Mayan Glyphs", " Decryption", " Unsolved Scripts", " Proto-Elamite", " Indus Seals", " Linear A", " The Phaistos Disk", " Etruscan", " Rongorongo", " Voynich Manuscript", " Cryptic Scripts", " Runes", " Ogham", " Modern Pictographic Scripts", " Chinese", " Japanese", " Scripts and Signs for Special Interest Groups", " Shorthand", " Scripts For the Sight-Impaired", " Braille", " Moon type", " Sign Language", " Languages: Invented, International and Artificial", " Solresol", " Volapük", " Esperanto", "Biographies", " Alberti, Leon Battista", " Bazeries, Etienne", " Cardano, Girolamo", " Champollion, Jean Francois", " Chappe, Claude", " Driscoll, Agnes", " Evans, Arthur", " Fabyan, George", " Friedman, Elizabeth", " Friedman, William", " Hagelin, Boris", " Hebern, Edward", " Hitt, Parker", " Kasiski, Friedrich", " Kerkhoffs, Auguste", " Kullback, Solomon", " Lamphere, Robert", " Mauborgne, Joseph", " Myer, Albert", " Porta, Giovanni", " Rawlinson, Henry", " Rossignol, Antoinne", " Safford, Laurence", " Trithemius, Johannes", " Ventris, Michael", " Vigenere, Blaise de", " Wheatstone, Charles", " Yardley, Herbert ", "Quizzes And Answers", "Appendix", "Glossary", "Bibliography", "Index".

Mest historiske fortællinger. Ikke ret meget hård teori. ( )
  bnielsen | Dec 25, 2016 |
Encyclopedic explanation of just about every type of code known, along with historical discussions. ( )
  rondoctor | Dec 25, 2009 |
Exibindo 3 de 3
sem resenhas | adicionar uma resenha
Você deve entrar para editar os dados de Conhecimento Comum.
Para mais ajuda veja a página de ajuda do Conhecimento Compartilhado.
Título canônico
Informação do Conhecimento Comum em inglês. Edite para a localizar na sua língua.
Título original
Títulos alternativos
Informação do Conhecimento Comum em inglês. Edite para a localizar na sua língua.
Data da publicação original
Pessoas/Personagens
Lugares importantes
Eventos importantes
Filmes relacionados
Epígrafe
Dedicatória
Primeiras palavras
Citações
Últimas palavras
Aviso de desambiguação
Editores da Publicação
Autores Resenhistas (normalmente na contracapa do livro)
Idioma original
CDD/MDS canônico
LCC Canônico

Referências a esta obra em recursos externos.

Wikipédia em inglês (2)

An alphabetical exploration of the world of codes and ciphers and significant individuals involved in that field.

Não foram encontradas descrições de bibliotecas.

Descrição do livro
Resumo em haiku

Current Discussions

Nenhum(a)

Capas populares

Links rápidos

Avaliação

Média: (3.76)
0.5
1
1.5
2 1
2.5
3 11
3.5 2
4 12
4.5 2
5 5

É você?

Torne-se um autor do LibraryThing.

 

Sobre | Contato | LibraryThing.com | Privacidade/Termos | Ajuda/Perguntas Frequentes | Blog | Loja | APIs | TinyCat | Bibliotecas Históricas | Os primeiros revisores | Conhecimento Comum | 206,747,485 livros! | Barra superior: Sempre visível