Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Buy

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history was altered by a few sheets of cryptic prose. This is just one link in humankind's evolutionary chain of secret communication, and just one of the fascinating incidents recounted in The Code Book, written by bestselling author Simon Singh.

Combining a superb storyteller's sense of drama and a scientist's appreciation for technical perfection, Singh traces the evolution of secret writing from ancient Greek military espionage to the frontiers of computer science. The result is an epic tale of human ingenuity, with examples that range from the poignant to the peculiar to the world-historical.

There is the case of the Beale ciphers, which involves Wild West escapades, a cowboy who amassed a vast fortune, a buried treasure worth $20 million, and a mysterious set of encrypted papers describing its whereabouts--papers that have baffled generations of cryptanalysts and captivated hundreds of treasure hunters.

A speedier end to a bloody war was the only reward that could be promised to the Allied code breakers of World Wars I and II, whose selfless contributions altered the course of history; but few of them lived to receive any credit for their top-secret accomplishments. Among the most moving of these stories is that of the World War II British code breaker Alan Turing, who gave up a brilliant career in mathematics to devote himself to the Allied cause, only to end his years punished by the state for his homosexuality, while his heroism was ignored. No less heroic were the Navajo code talkers, who volunteered without hesitation to risk their lives for the Allied forces in the Japanese theater, where they were routinely mistaken for the enemy.

Interspersed with these gripping stories are clear mathematical, linguistic, and technological demonstrations of codes, as well as illustrations of the remarkable personalities--many courageous, some villainous, and all obsessive--who wrote and broke them.

All roads lead to the present day, in which the possibility of a truly unbreakable code looms large. Singh explores this possibility, and the ramifications of our increasing need for privacy, even as it begins to chafe against the stated mission of the powerful and deeply secretive National Security Agency. Entertaining, compelling, and remarkably far-reaching, this is a book that will forever alter your view of history, what drives it, and how private that e-mail you just sent really is.

Included in the book is a worldwide Cipher Challenge--a $15,000 award will be given by the author to the first reader who cracks the code successfully. Progress toward the solution will be tracked on The Code Book website.

(HTML tags aren't allowed.)

The General Theory of Relativity: A Mathematical Approach
The General Theory of Relativity: A Mathematical Approach
The book aims to expound the general theory of relativity with a mathematical point of view. Catering to the needs of postgraduate students and researchers in the field of astrophysics and mathematical physics, it offers the readers a comprehensive understanding of the advanced topics of the subject matter. It specifically discusses the...
Scanners for Dummies
Scanners for Dummies
Get tips on installation, image editing, and more!

Create Web graphics, T-shirts, slide shows, and other fun projects

The easy way to have fun with digital images! With a scanner, you can do all kinds of cool stuff with photos and images. But how do you get the darn thing to work right? Relax! With this friendly guide at your side,...

Fundamental Nursing Skills
Fundamental Nursing Skills

Providing forward-thinking approaches and ideas for nurses of all categories, this reference has been written primarily in response to increasing concerns regarding the perceived lack of ability in both students and newly qualified nurses to perform clinical skills.

By outlining the elements of essential nursing procedure in a...


DNS and BIND, Fourth Edition
DNS and BIND, Fourth Edition
The fourth edition of DNS and BIND covers the new 9.1.0 and 8.2.3 versions of BIND as well as the older 4.9 version. There's also more extensive coverage of NOTIFY, IPv6 forward and reverse mapping, transaction signatures, and the new DNS Security Extensions; and a section on accommodating Windows 2000 clients,...
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
Iterated Function Systems for Real-Time Image Synthesis
Iterated Function Systems for Real-Time Image Synthesis
Natural phenomena can be visually described with fractal-geometry methods, where iterative procedures rather than equations are used to model objects. With the development of better modelling algorithms, the efficiency of rendering, the realism of computer-generated scenes and the interactivity of visual stimuli are reaching astonishing levels....
©2021 LearnIT (support@pdfchm.net) - Privacy Policy