Catalog Search Results
Author
Language
English
Appears on list
Description
The award-winning New York Times bestseller about the American women who secretly served as codebreakers during World War II—a "prodigiously researched and engrossing" (New York Times) book that "shines a light on a hidden chapter of American history" (Denver Post).
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While...
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While...
Author
Language
English
Description
National Bestseller
NPR Best Book of the Year
"Not all superheroes wear capes, and Elizebeth Smith Friedman should be the subject of a future Wonder Woman movie." —The New York Times
Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo that ever lived, an American woman and her husband who invented
...Author
Language
English
Description
A dual-timeline historical novel of codebreaking, secrets, murder, and romance, set in Hawaii in 1943 and 1965, follows two women--a cryptanalyist working to defeat the Japanese Army, and a rookie journalist investigating the disappearance of a high-profile guest during the grand opening of the Mauna Kea Beach Hotel.
Author
Language
English
Formats
Description
In this picture book biography, young readers will learn all about Elizebeth Friedman (1892-1980), a brilliant American code breaker who smashed Nazi spy rings, took down gangsters, and created the CIA's first cryptology unit. Her story came to light when her secret papers were finally declassified in 2015. From thwarting notorious rumrunners with only paper and pencil to "counter-spying into the minds and activities of" Nazis, Elizebeth held a pivotal...
Author
Language
English
Description
Are you curious about the history and evolution of Bitcoin and other cryptocurrencies? Do you want to learn how they work and what they mean for the world of money and technology? Do you want to discover the social, economic, and political implications of cryptocurrencies for individuals, groups, organizations, and nations?If you answered yes to any of these questions, then this book is for you. In this book, you will find an informative and comprehensive...
Author
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Language
Deutsch
Description
Viren, Würmer, Trojanische Pferde, das Arsenal der Hackerangriffe auf IT-Infrastrukturen scheint unerschöpflich. Nachdem Computerwurm Stuxnet 2010 das Steuerungssystem eines iranischen Atomkraftwerks befallen hatte und Computer durch die Malware Flame ferngesteuert und ausspioniert wurden, sorgte 2015 ein Virus namens Duqu 2.0 für Schlagzeilen, weil er die IT von Unternehmen in Europa, Asien und den USA infiziert hatte. Was aber wenn Computer grundsätzlich...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
14) CBSA Certified Blockchain Solution Architect Exam Practice Test and Dumps CBSA Blockchain Exam Guide
Author
Language
English
Description
Certified Blockchain Solution Architect (CBSA) is a professional certification designed for individuals seeking to validate their expertise in designing and implementing blockchain solutions. This credential, offered by the Blockchain Training Alliance, certifies that the holder has a deep understanding of blockchain technology, including the ability to architect and design blockchain-based systems, assess the technical requirements of a project,...
Author
Language
English
Description
"Blockchain Technology: Mastering the Digital Ledger Revolution"Embark on a transformative journey with "Blockchain Technology: Mastering the Digital Ledger Revolution," a comprehensive guide that demystifies the complex world of blockchain technology. This book is tailored for a diverse audience, from beginners curious about the basics to professionals looking to deepen their expertise in this rapidly evolving field.Inside the Book:Understanding...
18) Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing
Author
Language
English
Description
"Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing" is a comprehensive guide that provides an in-depth exploration of the latest techniques and tools used by cybersecurity professionals to protect networks and systems from cyber threats. With the rise of cybercrime, protecting digital assets has become a critical concern for individuals and organizations alike. This book provides a practical and accessible...
Author
Language
English
Description
Build distributed applications that resolve data ownership issues when working with transactions between multiple parties
Blockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders. With the help of Introduction to Blockchain and Ethereum, you'll learn how to create distributed Blockchain applications which do not depend on a central server or datacenter. The course begins by explaining Bitcoin,...
Author
Language
English
Description
Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand...
Borrow from another library
Didn't find what you need? Items not owned by Darien Library can be requested from other libraries via our interlibrary loan system (ILL).