Electronic catalog

el cat en


 

База данных: ELS EBSCO eBook

Page 1, Results: 5

Отмеченные записи: 0

DDC 005.8/24
C 91


    Cryptographic security solutions for the Internet of Things / / Mohammad Tariq Banday, editor. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, ©2019. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/935D9E79-4088-468B-8BEA-EA2D9211C405. - ISBN 9781522557432 (electronic bk.). - ISBN 1522557431 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Cryptographic security solutions for the Internet of Things. - Hershey, PA : Information Science Reference, an imprint of IGI Global, [2019]. - ISBN 9781522557425
    Содержание:
Title Page; Copyright Page; Book Series; Editorial Advisory Board; Table of Contents; Detailed Table of Contents; Foreword; Preface; Acknowledgment; Section 1: Introduction; Chapter 1: Security in Context of the Internet of Things; Section 2: Encryption and Cryptography; Chapter 2: Encryption Principles and Techniques for the Internet of Things; Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things; Section 3: Security Protocols; Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions
Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of ThingsChapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity; Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET; Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks; Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information; Section 4: Social/Legal Issues and Forensics
Chapter 10: Emerging Social and Legal Issues of the Internet of ThingsChapter 11: Digital Forensics in the Context of the Internet of Things; Compilation of References; About the Contributors; Index

~РУБ DDC 005.8/24

Рубрики: Internet of things--Security measures.

   Cryptography.


   COMPUTERS / Security / General.


   Cryptography.


Аннотация: "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--

Доп.точки доступа:
Banday, Mohammad Tariq, (1969-) \editor.\

Cryptographic security solutions for the Internet of Things / [Электронный ресурс] / Mohammad Tariq Banday, editor., ©2019. - 1 online resource с. (Введено оглавление)

1.

Cryptographic security solutions for the Internet of Things / [Электронный ресурс] / Mohammad Tariq Banday, editor., ©2019. - 1 online resource с. (Введено оглавление)


DDC 005.8/24
C 91


    Cryptographic security solutions for the Internet of Things / / Mohammad Tariq Banday, editor. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, ©2019. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/935D9E79-4088-468B-8BEA-EA2D9211C405. - ISBN 9781522557432 (electronic bk.). - ISBN 1522557431 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Cryptographic security solutions for the Internet of Things. - Hershey, PA : Information Science Reference, an imprint of IGI Global, [2019]. - ISBN 9781522557425
    Содержание:
Title Page; Copyright Page; Book Series; Editorial Advisory Board; Table of Contents; Detailed Table of Contents; Foreword; Preface; Acknowledgment; Section 1: Introduction; Chapter 1: Security in Context of the Internet of Things; Section 2: Encryption and Cryptography; Chapter 2: Encryption Principles and Techniques for the Internet of Things; Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things; Section 3: Security Protocols; Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions
Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of ThingsChapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity; Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET; Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks; Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information; Section 4: Social/Legal Issues and Forensics
Chapter 10: Emerging Social and Legal Issues of the Internet of ThingsChapter 11: Digital Forensics in the Context of the Internet of Things; Compilation of References; About the Contributors; Index

~РУБ DDC 005.8/24

Рубрики: Internet of things--Security measures.

   Cryptography.


   COMPUTERS / Security / General.


   Cryptography.


Аннотация: "This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--

Доп.точки доступа:
Banday, Mohammad Tariq, (1969-) \editor.\

DDC 005.8/24
C 91


    Cryptography : : breakthroughs in research and practice / / Information Resources Management Association (editor). - Hershey, PA : : Information Science Reference (an imprint of IGI Global),, 2020. - 1 online resource (xv, 578 pages). : il. - (Critical explorations). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/FD2AA5AB-8C7A-4E5F-81DF-181E5D13CD17. - ISBN 1799817644 (electronic book). - ISBN 9781799817642 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 20, 2019).
Параллельные издания: Print version: : Cryptography. - Hershey, PA : Information Science Reference, 2020. - ISBN 9781799817635

~РУБ DDC 005.8/24

Рубрики: Cryptography.

   Data transmission systems--Security measures.


   Computers--Access control.


   Computers--Access control.


   Cryptography.


   Data transmission systems--Security measures.


Аннотация: "This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"--

Доп.точки доступа:
Information Resources Management Association,

Cryptography : [Электронный ресурс] : breakthroughs in research and practice / / Information Resources Management Association (editor)., 2020. - 1 online resource (xv, 578 pages). с.

2.

Cryptography : [Электронный ресурс] : breakthroughs in research and practice / / Information Resources Management Association (editor)., 2020. - 1 online resource (xv, 578 pages). с.


DDC 005.8/24
C 91


    Cryptography : : breakthroughs in research and practice / / Information Resources Management Association (editor). - Hershey, PA : : Information Science Reference (an imprint of IGI Global),, 2020. - 1 online resource (xv, 578 pages). : il. - (Critical explorations). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/FD2AA5AB-8C7A-4E5F-81DF-181E5D13CD17. - ISBN 1799817644 (electronic book). - ISBN 9781799817642 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 20, 2019).
Параллельные издания: Print version: : Cryptography. - Hershey, PA : Information Science Reference, 2020. - ISBN 9781799817635

~РУБ DDC 005.8/24

Рубрики: Cryptography.

   Data transmission systems--Security measures.


   Computers--Access control.


   Computers--Access control.


   Cryptography.


   Data transmission systems--Security measures.


Аннотация: "This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"--

Доп.точки доступа:
Information Resources Management Association,

DDC 005.8/24
Q 23


    Quantum cryptography and the future of cyber security / / [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. - Hershey, PA : : IGI Global,, [2020]. - 1 online resource (xxix, 343 pages). : il. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/2601FB9C-530B-43C5-8F6E-D49FD9FFA510. - ISBN 9781799822554 (electronic book). - ISBN 1799822559 (electronic book). - ISBN 9781799822561 (electronic bk.). - ISBN 1799822567 (electronic bk.)
"Premier Reference Source" -- Cover. Description based on online resource; title from digital title page (viewed on February 14, 2020).
Параллельные издания: Print version: : Quantum cryptography and the future of cyber security. - Hershey, PA : Information Science Reference, 2020. - ISBN 9781799822530
    Содержание:
Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks.

~РУБ DDC 005.8/24

Рубрики: Quantum communication--Security measures.

   Cryptography.


   Data encryption (Computer science)


   Cryptography.


   Data encryption (Computer science)


Аннотация: "This book explores the latest applications and advancements of quantum cryptography and cyber security"--

Доп.точки доступа:
Chaubey, Nirbhay Kumar, (1971-) \editor.\
Prajapati, Bhavesh B., (1975-) \editor.\

Quantum cryptography and the future of cyber security / [Электронный ресурс] / [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati., [2020]. - 1 online resource (xxix, 343 pages). с. (Введено оглавление)

3.

Quantum cryptography and the future of cyber security / [Электронный ресурс] / [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati., [2020]. - 1 online resource (xxix, 343 pages). с. (Введено оглавление)


DDC 005.8/24
Q 23


    Quantum cryptography and the future of cyber security / / [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. - Hershey, PA : : IGI Global,, [2020]. - 1 online resource (xxix, 343 pages). : il. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/2601FB9C-530B-43C5-8F6E-D49FD9FFA510. - ISBN 9781799822554 (electronic book). - ISBN 1799822559 (electronic book). - ISBN 9781799822561 (electronic bk.). - ISBN 1799822567 (electronic bk.)
"Premier Reference Source" -- Cover. Description based on online resource; title from digital title page (viewed on February 14, 2020).
Параллельные издания: Print version: : Quantum cryptography and the future of cyber security. - Hershey, PA : Information Science Reference, 2020. - ISBN 9781799822530
    Содержание:
Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks.

~РУБ DDC 005.8/24

Рубрики: Quantum communication--Security measures.

   Cryptography.


   Data encryption (Computer science)


   Cryptography.


   Data encryption (Computer science)


Аннотация: "This book explores the latest applications and advancements of quantum cryptography and cyber security"--

Доп.точки доступа:
Chaubey, Nirbhay Kumar, (1971-) \editor.\
Prajapati, Bhavesh B., (1975-) \editor.\

DDC 004.67/8
L 74


    Limitations and future applications of quantum cryptography / / Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan. - 4018/978-1-7998-6677-0. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xxvii, 305 pages) : : il ( час. мин.), 4018/978-1-7998-6677-0. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/0602315B-63ED-4E9B-A9F8-140926321EA3. - ISBN 1799866793 (electronic book). - ISBN 9781799866794 (electronic bk.)
"Premier Reference Source"--Taken from front cover. Online resource; title from digital title page (viewed on March 17, 2021).
Параллельные издания: Print version: : Limitations and future applications of quantum cryptography. - Hershey, PA : Information Science Reference, [2021]. - ISBN 9781799866770
    Содержание:
VLSI architecture of substitution box / Abhishek Kumar, Suman Tripathi -- Fundamentals of quantum computing, quantum supremacy and quantum machine learning / Kamaljit Lakhtaria, Vrunda Gadesha -- Quantum security for IoT to secure healthcare applications and it's data / Binod Kumar, Sheetal Prasad -- Data hiding in color image using steganography and cryptography to support message privacy / Sabyasachi Pramanik, Ramkrishna Ghosh, Sneh Kalra, Jayeeta Majumder, Digvijay Pandey, Souvik Pal -- Quantum computing : concept, applications and need of law for its enforcement / Neeraj Kumar, Alka Agrawal -- Quantum algorithms with applications to cryptography : quantum algorithms / Renata Wong, Amandeep Bhatia -- Implications on quantum cryptography : cryptography / Varsha Sahni, Neeraj Kumar, Sujatha Krishnamoorthy -- A contemporary study on quantum-computing security mechanisms in 5G networks / Rydhm Beri -- Define security and privacy using quantum internet / Nilay Mistry, Ankit Dholakiya, Jay Prajapati -- Quantum and visual crypto biometric based secured authentication system transactions, server and locker system in cloud / Nandini C., Jahnavi S. -- The role of quantum computing in software forensics & digital evidence : issues and challenges / Sandeep Sharma, Mazhar Khaliq -- Recent progress in quantum machine learning / Amandeep Bhatia, Renata Wong -- Advances of quantum machine learning / Bhanu Chander -- Image processing using quantum computing : a review / Bably Dolly, Deepa Raj -- Quantum cryptography for securing IoT based healthcare system / Anand Sharma -- Function optimization using IBM Q / Soumyajit Goswami.

~РУБ DDC 004.67/8

Рубрики: Quantum computing.

   Cryptography.


   Data encryption (Computer science)


   Internet of things.


   Cryptography


   Data encryption (Computer science)


   Internet of things


   Quantum computing


Аннотация: "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"--

Доп.точки доступа:
Kumar, Neeraj, (1981-) \editor.\
Agrawal, Alka, (1977-) \editor.\
Chaurasia, Brijesh Kumar, (1975-) \editor.\
Khan, R. A., (Raees Ahmad), \editor.\

Limitations and future applications of quantum cryptography / [Электронный ресурс] / Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan., [2021]. - 1 online resource (xxvii, 305 pages) : с. (Введено оглавление)

4.

Limitations and future applications of quantum cryptography / [Электронный ресурс] / Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan., [2021]. - 1 online resource (xxvii, 305 pages) : с. (Введено оглавление)


DDC 004.67/8
L 74


    Limitations and future applications of quantum cryptography / / Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan. - 4018/978-1-7998-6677-0. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xxvii, 305 pages) : : il ( час. мин.), 4018/978-1-7998-6677-0. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/0602315B-63ED-4E9B-A9F8-140926321EA3. - ISBN 1799866793 (electronic book). - ISBN 9781799866794 (electronic bk.)
"Premier Reference Source"--Taken from front cover. Online resource; title from digital title page (viewed on March 17, 2021).
Параллельные издания: Print version: : Limitations and future applications of quantum cryptography. - Hershey, PA : Information Science Reference, [2021]. - ISBN 9781799866770
    Содержание:
VLSI architecture of substitution box / Abhishek Kumar, Suman Tripathi -- Fundamentals of quantum computing, quantum supremacy and quantum machine learning / Kamaljit Lakhtaria, Vrunda Gadesha -- Quantum security for IoT to secure healthcare applications and it's data / Binod Kumar, Sheetal Prasad -- Data hiding in color image using steganography and cryptography to support message privacy / Sabyasachi Pramanik, Ramkrishna Ghosh, Sneh Kalra, Jayeeta Majumder, Digvijay Pandey, Souvik Pal -- Quantum computing : concept, applications and need of law for its enforcement / Neeraj Kumar, Alka Agrawal -- Quantum algorithms with applications to cryptography : quantum algorithms / Renata Wong, Amandeep Bhatia -- Implications on quantum cryptography : cryptography / Varsha Sahni, Neeraj Kumar, Sujatha Krishnamoorthy -- A contemporary study on quantum-computing security mechanisms in 5G networks / Rydhm Beri -- Define security and privacy using quantum internet / Nilay Mistry, Ankit Dholakiya, Jay Prajapati -- Quantum and visual crypto biometric based secured authentication system transactions, server and locker system in cloud / Nandini C., Jahnavi S. -- The role of quantum computing in software forensics & digital evidence : issues and challenges / Sandeep Sharma, Mazhar Khaliq -- Recent progress in quantum machine learning / Amandeep Bhatia, Renata Wong -- Advances of quantum machine learning / Bhanu Chander -- Image processing using quantum computing : a review / Bably Dolly, Deepa Raj -- Quantum cryptography for securing IoT based healthcare system / Anand Sharma -- Function optimization using IBM Q / Soumyajit Goswami.

~РУБ DDC 004.67/8

Рубрики: Quantum computing.

   Cryptography.


   Data encryption (Computer science)


   Internet of things.


   Cryptography


   Data encryption (Computer science)


   Internet of things


   Quantum computing


Аннотация: "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"--

Доп.точки доступа:
Kumar, Neeraj, (1981-) \editor.\
Agrawal, Alka, (1977-) \editor.\
Chaurasia, Brijesh Kumar, (1975-) \editor.\
Khan, R. A., (Raees Ahmad), \editor.\

DDC 005.8/24
L 54

Lennon, Brian, (1971-).
    Passwords : : philology, security, authentication / / Brian Lennon. - Cambridge, Massachusetts ; ; London, England : : The Belknap Press of Harvard University Press,, ©2018. - 1 online resource (xviii, 207 pages). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/DF5AFBBD-E879-49CA-8B50-EB48023C4A59. - ISBN 9780674985391 (electronic bk.). - ISBN 0674985397 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Lennon, Brian, 1971- Passwords. - Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018. - ISBN 9780674980761

~РУБ DDC 005.8/24

Рубрики: Computers--Access control--Passwords.

   Cryptography.


   Data encryption (Computer science)


   Philology.


   Electronic surveillance.


   Philology, Modern.


   Ordinateurs--Accès--Contrôle--Mots de passe.


   Cryptographie.


   Chiffrement (Informatique)


   Philologie.


   Surveillance électronique.


   philology.


   COMPUTERS--Security--Cryptography.


   COMPUTERS / History


   Computers--Access control--Passwords.


   Cryptography.


   Data encryption (Computer science)


   Electronic surveillance.


   Philology.


Аннотация: Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--

Lennon, Brian,. Passwords : [Электронный ресурс] : philology, security, authentication / / Brian Lennon., ©2018. - 1 online resource (xviii, 207 pages) с.

5.

Lennon, Brian,. Passwords : [Электронный ресурс] : philology, security, authentication / / Brian Lennon., ©2018. - 1 online resource (xviii, 207 pages) с.


DDC 005.8/24
L 54

Lennon, Brian, (1971-).
    Passwords : : philology, security, authentication / / Brian Lennon. - Cambridge, Massachusetts ; ; London, England : : The Belknap Press of Harvard University Press,, ©2018. - 1 online resource (xviii, 207 pages). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/DF5AFBBD-E879-49CA-8B50-EB48023C4A59. - ISBN 9780674985391 (electronic bk.). - ISBN 0674985397 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Lennon, Brian, 1971- Passwords. - Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018. - ISBN 9780674980761

~РУБ DDC 005.8/24

Рубрики: Computers--Access control--Passwords.

   Cryptography.


   Data encryption (Computer science)


   Philology.


   Electronic surveillance.


   Philology, Modern.


   Ordinateurs--Accès--Contrôle--Mots de passe.


   Cryptographie.


   Chiffrement (Informatique)


   Philologie.


   Surveillance électronique.


   philology.


   COMPUTERS--Security--Cryptography.


   COMPUTERS / History


   Computers--Access control--Passwords.


   Cryptography.


   Data encryption (Computer science)


   Electronic surveillance.


   Philology.


Аннотация: Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--

Page 1, Results: 5

 

All acquisitions for 
Or select a month