Catalog Search Results
Author
Series
Robert Langdon novels volume 2
Accelerated Reader
IL: UG - BL: 6.4 - AR Pts: 23
Lexile measure
850L
Language
English
Description
While in Paris on business, Harvard symbologist Robert Langdon receives an urgent late-night phone call. The elderly curator of the Louvre has been murdered inside the museum, a baffling cipher found near the body. As Langdon and a gifted French cryptologist, Sophie Neveu, sort through the bizarre riddles, they are stunned to discover a trail of clues hidden in the works of Da Vinci- clues visible for all to see and yet ingeniously disguised by the...
Author
Language
English
Description
A brilliant female codebreaker. An "unbreakable" Japanesenaval code. A pilot on a top-secret mission that could change the course of WWII.The Codebreaker's Secret is a dazzling story of love and intrigue set during America's darkest hour. 1943.As war in the Pacific rages on, Isabel Cooper and her codebreaker colleagues huddle in "the dungeon" at Station HYPO in Pearl Harbor, deciphering secrets plucked from the airwaves in a race to bring down the...
Pub. Date
[2015]
Edition
Widescreen version.
Language
English
Formats
Description
During the winter of 1952, British authorities entered the home of mathematician, cryptanalyst and war hero Alan Turing to investigate a reported burglary. They instead ended up arresting Turing himself on charges of "gross indecency," an accusation that would lead to his devastating conviction for the criminal offense of homosexuality - little did officials know, they were actually incriminating the pioneer of modern-day computing. Famously leading...
Author
Publisher
Hachette Books
Pub. Date
2017.
Edition
First edition.
Physical Desc
xiv, 416 pages, 8 unnumbered pages of plates : illustrations ; 24 cm
Language
English
Appears on list
Description
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them.
Author
Series
The 39 clues. Main series volume 5
Accelerated Reader
IL: MG - BL: 4.7 - AR Pts: 5
Language
English
Formats
Description
Where are Amy and Dan Cahill? The two kids were last seen in Egypt, hunting for one of the 39 Clues that could make them the most powerful people on earth. But no one has seen the siblings since. Has the ruthless Irina Spasky finally tracked them down? Or worse ... the Madrigals?
Author
Language
English
Formats
Description
The true story of the US Army's Comanche Code Talkers, from their recruitment and training to active duty in World War II and postwar life.
Among the allied troops that came ashore in Normandy on D-Day, June 6, 1944, were thirteen Comanches in the 4th Infantry Division, 4th Signal Company. Under German fire they laid communications lines and began sending messages in a form never before heard in Europe? Coded Comanche. For the rest of World War II,...
Author
Series
Accelerated Reader
IL: MG - BL: 6.4 - AR Pts: 1
Language
English
Formats
Description
During WWII, Japan's navy relied on secret codes to communicate battle plans. By early 1942, US experts had cracked the code. The Japanese had planned a surprise attack on US Navy ships, but now the Americans knew the attack was coming. They turned the tables on the enemy and won a decisive victory. Math has always been key to warfare. Scientists use mathematical calculations to understand how missiles fly, or how to build faster airplanes. Soldiers...
Author
Publisher
Pegasus Books
Pub. Date
2015.
Physical Desc
viii, 438 pages : illustrations ; 24 cm
Language
English
Description
"A startling and vivid account of World War I that uncovers how wartime code-breaking, aeronautics, and scientific research laid the foundation for many of the innovations of the twentieth century."--
13) Code talker
Author
Publisher
Berkley Caliber
Pub. Date
2011.
Edition
First edition.
Physical Desc
viii, 310 pages, 16 unnumbered pages of plates : illustrations, maps ; 24 cm
Language
English
Description
Chester Nez, the last surviving member of the original twenty-nine code talkers, discusses his life growing up in the Checkerboard Area of the Navajo reservation, and shares the story of how he helped the United States develop and implement a secret military language based on his native language during World War II that became the only unbroken code in modern warfare.
Author
Publisher
Dutton Children's Books
Pub. Date
[2009]
Edition
First edition.
Accelerated Reader
IL: MG - BL: 9.5 - AR Pts: 5
Lexile measure
1150L
Physical Desc
170 pages : illustrations ; 21 cm
Language
English
Description
From the ingenious ciphers of Italian princes to the spy books of the Civil War to the advanced techniques of the CIA, codes and code breaking have played important roles throughout history.
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
Categorical trust in digitality is nirvana for information technology (IT) and operational technology (OT) convergence from device manufacturing to provisioning, commissioning, and field operations in production environments. It may not require expensive hardware upgrades to legacy devices and may be achievable with cost effective software or firmware enhancements, to extend the operational lifetime and efficiency of brownfield and greenfield devices...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
In Interlibrary Loan Catalog
Didn't find what you need? Items not owned by MetroShare Consortium can be requested from other Interlibrary Loan Catalog libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request