A brief history of cryptology and cryptographic algorithms / / John F. Dooley
| A brief history of cryptology and cryptographic algorithms / / John F. Dooley |
| Autore | Dooley John F |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York : , : Springer, , 2013 |
| Descrizione fisica | 1 online resource (xii, 99 pages) : illustrations (some color) |
| Disciplina |
004.09
652.8 652.809 |
| Collana | SpringerBriefs in Computer Science |
| Soggetto topico |
Data encryption (Computer science) - History
Cryptography - History |
| ISBN | 3-319-01628-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: A Revolutionary Cipher -- Cryptology Before 1500: A Bit of Magic -- The Black Chambers: 1500 – 1776 -- Crypto goes to War: 1861 – 1865 -- Crypto and the War to End All Wars: 1914 – 1917 -- The Interwar Period: 1919 – 1939 -- The Coming of the Machines: 1918 – 1945 -- The Machines Take Over: Computer Cryptography -- Alice and Bob and Whit and Martin: Public Key Crypto. |
| Record Nr. | UNINA-9910437573303321 |
Dooley John F
|
||
| New York : , : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Codes, ciphers and spies : tales of military intelligence in World War I / / John F. Dooley
| Codes, ciphers and spies : tales of military intelligence in World War I / / John F. Dooley |
| Autore | Dooley John F |
| Edizione | [First edition 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Copernicus, , 2016 |
| Descrizione fisica | 1 online resource (xvii, 280 pages) : 39 illustrations, 6 illustrations in color |
| Disciplina | 900 |
| Soggetto topico |
Data encryption (Computer science) - History
World War, 1914-1918 - Cryptography World War, 1914-1918 - Military intelligence |
| ISBN | 3-319-29415-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | An Introduction and a Few Words on Codes and Ciphers -- PART I: The AEF -- The Americans Embark: Getting to France 1917 – 1918 -- Introduction to Communications, Codes, and Ciphers in the AEF -- The AEF and Colonel Moorman -- Cryptology at the Front -- The AEF: Breaking Codes and Ciphers -- The AEF: German Codes and Ciphers -- The AEF Fights: 1918 -- PART II: MI-8 and the Home Front -- MI-8 and Civilian Messages -- Civilian Correspondence: Foreign Letters and Hoaxes -- Civilian Correspondence: Prisoners and Spies -- Civilian Correspondence: Families and Love Letters -- PART III: German Spies in America, 1914 – 1918 -- Spies Among Us: The New York Cell, 1914 – 1915 -- Spies Among Us: Baltimore, Germs, Black Tom, and Kingsland, 1916 – 1917 -- The Waberski Cipher: A Spy is Condemned -- Madame Victorica Arrives in New York -- Madame Victorica and German Agents in the U.S. -- More German Spies -- Madame Victorica and Invisible Inks -- Madame Victorica – Captured! -- Part IV: Epilogue -- Epilogue. |
| Record Nr. | UNINA-9910254787503321 |
Dooley John F
|
||
| Cham : , : Springer International Publishing : , : Imprint : Copernicus, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Gambler and the Scholars [[electronic resource] ] : Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology / / by John F. Dooley
| The Gambler and the Scholars [[electronic resource] ] : Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology / / by John F. Dooley |
| Autore | Dooley John F |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (XIII, 332 p. 1 illus.) |
| Disciplina | 004.09 |
| Collana | History of Computing |
| Soggetto topico |
Computers—History
Cryptography Data encryption (Computer science) Data protection History of Computing Cryptology Data and Information Security |
| ISBN | 3-031-28318-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Introduction -- 2. Beginnings – Herbert Yardley -- 3. Beginnings – William Friedman and Elizebeth Smith -- 4. The Great War – Meetings -- 5. Wars End -- 6. What Might Have Been -- 7. The Cipher Bureau: Early Days -- 8. The Lone Cryptologists: Escape from Riverbank -- 9. The Cipher Bureau: Success and Decline -- 10. The Lone Cryptologists: Washington Life -- 11. Cryptologic Endings and Beginnings -- 12. The American Black Chamber -- 13. A Pretty Young Woman in a Pink Dress -- 14. One Career After Another -- 15. Red and Purple -- 16. Yardley Abroad -- 17. The Friedmans at War – William -- 18. The Friedmans at War – Elizebeth -- 19. Yardley’s War -- 20. Endings -- 21. Memories of Friedman and Yardley -- Appendix - A Few Words of Cryptology -- Bibliography -- Photo and Illustration Credits. |
| Record Nr. | UNISA-996546830603316 |
Dooley John F
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
The Gambler and the Scholars : Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology / / by John F. Dooley
| The Gambler and the Scholars : Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology / / by John F. Dooley |
| Autore | Dooley John F |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (XIII, 332 p. 1 illus.) |
| Disciplina | 004.09 |
| Collana | History of Computing |
| Soggetto topico |
Computers - History
Cryptography Data encryption (Computer science) Data protection History of Computing Cryptology Data and Information Security |
| ISBN |
9783031283185
303128318X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Introduction -- 2. Beginnings – Herbert Yardley -- 3. Beginnings – William Friedman and Elizebeth Smith -- 4. The Great War – Meetings -- 5. Wars End -- 6. What Might Have Been -- 7. The Cipher Bureau: Early Days -- 8. The Lone Cryptologists: Escape from Riverbank -- 9. The Cipher Bureau: Success and Decline -- 10. The Lone Cryptologists: Washington Life -- 11. Cryptologic Endings and Beginnings -- 12. The American Black Chamber -- 13. A Pretty Young Woman in a Pink Dress -- 14. One Career After Another -- 15. Red and Purple -- 16. Yardley Abroad -- 17. The Friedmans at War – William -- 18. The Friedmans at War – Elizebeth -- 19. Yardley’s War -- 20. Endings -- 21. Memories of Friedman and Yardley -- Appendix - A Few Words of Cryptology -- Bibliography -- Photo and Illustration Credits. |
| Record Nr. | UNINA-9910686471703321 |
Dooley John F
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
History of Cryptography and Cryptanalysis : Codes, Ciphers, and Their Algorithms / / by John F. Dooley
| History of Cryptography and Cryptanalysis : Codes, Ciphers, and Their Algorithms / / by John F. Dooley |
| Autore | Dooley John F |
| Edizione | [2nd ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (353 pages) |
| Disciplina | 652.8 |
| Collana | History of Computing |
| Soggetto topico |
Computers - History
Cryptography Data encryption (Computer science) Science - History Coding theory Information theory History of Computing Cryptology History of Science Coding and Information Theory |
| ISBN |
9783031674853
3031674855 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. A Revolutionary Cipher -- 2. Crypto Before 1500: A Bit of Magic -- 3. The Black Chambers: 1500 – 1776 -- 4. Crypto Goes to War: The American Revolution -- 5. Crypto Goes to War: The American Civil War 1861 – 1865 -- 6. Crypto and the War to End All Wars: 1914 – 1919 -- 7. The Interwar Period: 1919 – 1941 -- 8. The Rise of the Machines: 1918 – 1941 -- 9. Battle Against the Machines: World War II 1939 – 1945 -- 10. The Machines Take Over: Computer Cryptography -- 11. Alice and Bob and Whit and Martin: Public-Key Cryptography -- 12. Web and Mobile Device Cryptology -- 13. Cyber Weapons and Cyber Warfare -- 14. Cryptology and the Internet of Things -- 15. What is Next in Cryptology? -- 16. Cipher Mysteries. |
| Record Nr. | UNINA-9910899899903321 |
Dooley John F
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
History of Cryptography and Cryptanalysis : Codes, Ciphers, and Their Algorithms / / by John F. Dooley
| History of Cryptography and Cryptanalysis : Codes, Ciphers, and Their Algorithms / / by John F. Dooley |
| Autore | Dooley John F |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XIV, 303 p. 99 illus., 38 illus. in color.) |
| Disciplina | 652.8 |
| Collana | History of Computing |
| Soggetto topico |
Coding theory
Information theory Computers Computer science—Mathematics History Coding and Information Theory History of Computing Math Applications in Computer Science History of Science |
| ISBN | 3-319-90443-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: A Revolutionary Cipher -- Crypto Before 1500: A Bit of Magic -- The Black Chambers: 1500 – 1776 -- Crypto Goes to War: The American Revolution -- Crypto Goes to War: The American Civil War 1861 – 1865 -- Crypto and the War to End All Wars: 1914 – 1919 -- The Interwar Period: 1919 – 1941 -- The Rise of the Machines: 1918 – 1941 -- Battle Against the Machines: World War II 1939 – 1945 -- The Machines Take Over: Computer Cryptography -- Alice and Bob and Whit and Martin: Public-Key Cryptography -- Web and Mobile Device Cryptology -- Cyber Weapons and Cyber Warfare -- Cryptology and the Internet of Things -- What is Next in Cryptology? -- Cipher Mysteries. |
| Record Nr. | UNINA-9910299307003321 |
Dooley John F
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Software Development, Design and Coding : With Patterns, Debugging, Unit Testing, and Refactoring / / by John F. Dooley
| Software Development, Design and Coding : With Patterns, Debugging, Unit Testing, and Refactoring / / by John F. Dooley |
| Autore | Dooley John F |
| Edizione | [2nd ed. 2017.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 |
| Descrizione fisica | 1 online resource (XXII, 320 p. 65 illus., 22 illus. in color.) |
| Disciplina | 005.1 |
| Soggetto topico |
Java (Computer program language)
Programming languages (Electronic computers) Java Programming Languages, Compilers, Interpreters |
| ISBN |
9781484231531
1484231538 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Introduction to Software Development -- 2. Software Process Models -- 3. Project Management Essentials -- 4. Requirements -- 5. Software Architecture -- 6. Design Principles -- 7. Structured Design -- 8. Object-Oriented Overview -- 9. Object-Oriented Design Principles -- 10. Object-Oriented Design Patterns -- 11. Design Patterns -- 12. Parallel Programming -- 13. Parallel Design Patterns -- 14. Code Construction -- 15. Debugging -- 16. Unit Testing -- 17. Code Reviews and Inspections -- 18. Ethics and Professional Practice -- 19. Wrapping it All Up. |
| Record Nr. | UNINA-9910254858203321 |
Dooley John F
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||