Catalog Search Results
Publisher
Iello
Pub. Date
[2017]
Language
English
Appears on list
Description
"Communicate safely! Join the greatest Encryptor team in the world! Your mission: transmit secret codes to your teammates without letting the opposing team intercept. Decrypto is a "scramble communication" game: you must give clues to your teammates that are precise enough, so they can understand you, but vague enough, to make sure your opponents don't get the message...٣ -- from publishers website
Author
Language
English
Formats
Description
An exploration of how codes-both cipher and aesthetic-have come to exist in history from Pythagoras through the Knights Templar to Turing and more.
Did the Masons encode messages in walls-and even in the street plan of Washington, D.C.? Does the Hebrew Bible conceal hidden mysteries? Ingenious methods for encoding secrets have taken many amazing turns through the ages, from the military signals the Romans flashed from hilltop to hilltop, to the computer...
Author
Publisher
Hachette Books
Pub. Date
2017.
Language
English
Formats
Description
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them.
Author
Publisher
Bloomsbury Children's Books
Pub. Date
2019.
Language
English
Description
"Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Language
English
Formats
Description
In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Traffic in this new encryption increased dramatically and Bletchley Park codebreakers worked furiously to decipher the code that held the key to the secrets of Nazi high command. The codebreakers used science, maths, innovation and improvisation to invent an entirely new...
Author
Accelerated Reader
IL: MG - BL: 6.3 - AR Pts: 1
Language
English
Formats
Description
In this picture book biography, young readers will learn all about Elizebeth Friedman (1892-1980), a brilliant American code breaker who smashed Nazi spy rings, took down gangsters, and created the CIA's first cryptology unit. Her story came to light when her secret papers were finally declassified in 2015. From thwarting notorious rumrunners with only paper and pencil to "counter-spying into the minds and activities of" Nazis, Elizebeth held a pivotal...
Author
Language
English
Description
1940. As England prepares to fight the Nazis, three very different women answer the call to mysterious country estate Bletchley Park, where the best minds in Britain train to break German military codes. Vivacious debutante Osla is the girl who has everything, but she burns to prove herself as more than a society girl. Imperious self-made Mab, works the legendary codebreaking machines as she conceals old wounds. Both Osla and Mab are quick to see...
Author
Language
English
Formats
Description
In 1916, at the height of World War I, brilliant Shakespeare expert Elizebeth Smith went to work for an eccentric tycoon on his estate outside Chicago. The tycoon had close ties to the U.S. government, and he soon asked Elizebeth to apply her language skills to an exciting new venture: code-breaking. There she met the man who would become her husband, groundbreaking cryptologist William Friedman. Though she and Friedman are in many ways the "Adam...
Author
Language
English
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Language
English
Description
"Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million.” These basic cybersecurity statistics should alarm everyone. With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of cybersecurity professionals. These are the people responsible...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
In MnLINK
Didn't find what you need? Items not owned by Plum Creek Library System can be requested from other MnLINK libraries to be delivered to your local library for pickup.