Cryptography
Resource Information
The concept Cryptography represents the subject, aboutness, idea or notion of resources found in Chemeketa Cooperative Regional Library Service (CCRLS).This resource has been enriched with EBSCO NoveList data.
The Resource
Cryptography
Resource Information
The concept Cryptography represents the subject, aboutness, idea or notion of resources found in Chemeketa Cooperative Regional Library Service (CCRLS).
This resource has been enriched with EBSCO NoveList data.
- Label
- Cryptography
95 Items that share the Concept Cryptography
Context
Context of CryptographySubject of
No resources found
No enriched resources found
- trueA song unheard
- trueAlan Turing : the enigma : the book that inspired the film The imitation game
- trueBattle of wits : the complete story of codebreaking in World War II
- trueBetween silk and cyanide : a codemaker's war, 1941-1945
- trueCan you crack the code? : a fascinating history of ciphers and cryptology
- trueCharlie Thorne and the last equation
- trueChester Nez and the unbreakable code : a Navajo code talker's story
- Code breakers : from hieroglyphs to hackers
- trueCode girls : the true story of the American women who secretly broke codes in World War II
- trueCode girls : the untold story of the American women code breakers of World War II
- trueCode girls : the untold story of the American women code breakers of World War II
- trueCode talker
- trueCode talker : a novel about the Navajo Marines of World War Two
- trueCode warriors : NSA's codebreakers and the secret intelligence war against the Soviet Union
- Codebreaker : the history of codes and ciphers, from the ancient pharaohs to quantum cryptography
- Codes and ciphers
- trueCodes and ciphers
- Codes and ciphers : secret writing through the ages
- Codes and secret writing
- Cryptanalysis; : a study of ciphers and their solution
- trueCryptography : the key to digital security, how it works, and why it matters
- trueCryptonomicon
- trueDecoded
- trueDuke with benefits
- trueEmperor
- trueEnigma
- trueGlorious boy : a novel
- trueHow I became a spy
- How to write and decode secret messages
- trueIn Farleigh Field : a novel
- Internet and intranet security management : risks and solutions
- Kahn on codes : secrets of the new cryptology
- La Cryptographie, ou, l'art d'écrire en chiffres
- Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes
- trueLook! what do you see? : an art puzzle book of American & Chinese songs
- Lu & Clancy's secret languages
- trueMaking secret codes
- Manual for the Solution of Military Ciphers
- Mathematical Recreations and Essays
- Mensa presents secret codes for kids
- Message authentication code (MAC) validation system : requirements and procedures
- trueMourning dove : an Ella Clah novel
- trueMr. Summerling's Secret Code
- trueMysterious messages : a history of codes and ciphers
- Navajo code talkers
- trueNavajo code talkers
- trueNavajo code talkers
- trueNavajo weapon : the Navajo code talkers
- trueNemesis
- trueOne to nine : the inner life of numbers
- truePopCo
- Privacy and security online : best practices for cybersecurity
- trueSabotage
- trueSecret agent Y.O.U. : the official guide to secret codes, disguises, surveillance and more
- Secret writing : the craft of the cryptographer
- trueSpeaking secret codes
- trueTales of the mighty code talkers, Volume one
- trueThe Alexander cipher
- trueThe Enigma game
- trueThe Fuhrer's Reserve
- trueThe Jefferson key : a novel
- trueThe Kindaichi case files, Vol. 11, Kindaichi the killer part 2
- trueThe Lincoln myth : a novel
- trueThe Montefeltro conspiracy : a Renaissance mystery decoded
- trueThe Rope catcher : a novel
- trueThe Rose Code
- trueThe Templar's code
- trueThe book of God and physics : a novel of the Voynich mystery
- The book of codes : understanding the world of hidden messages : an illustrated guide to signs, symbols, ciphers, and secret languages
- trueThe chaos code
- trueThe code book : how to make it, break it, hack it, crack it
- The code talkers : American Indians in World War II
- trueThe copper scroll
- trueThe copper scroll
- trueThe genius plague
- trueThe haunted lighthouse
- trueThe imitation game : Alan Turing decoded
- trueThe king's deception : a novel
- trueThe king's justice
- trueThe labyrinth key
- trueThe last Templar
- trueThe last disciple
- trueThe last sacrifice
- trueThe lost testament
- trueThe lost treasure of the Templars
- trueThe potato chip puzzles
- trueThe puzzling world of Winston Breen
- trueThe secret lives of codebreakers : the men and women who cracked the Enigma code at Bletchley Park
- trueThe secret of the skeleton key
- trueThe secret state : a history of intelligence and espionage
- trueThe sixth day
- trueThe stone child
- trueTop secret : a handbook of codes, ciphers, and secret writing
- trueWar of Shadows : Codebreakers, Spies, and the Secret Struggle to Drive the Nazis from the Middle East
- trueWindtalkers : a novelization
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ccrls.org/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ccrls.org/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ccrls.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.ccrls.org/">Chemeketa Cooperative Regional Library Service (CCRLS)</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Cryptography
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ccrls.org/resource/h3jDwrnUWjg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ccrls.org/resource/h3jDwrnUWjg/">Cryptography</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ccrls.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.ccrls.org/">Chemeketa Cooperative Regional Library Service (CCRLS)</a></span></span></span></span></div>