The Gambler and the Scholars (Record no. 177536)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05179nam a22005775i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-28318-5 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125412.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230405s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031283185 |
-- | 978-3-031-28318-5 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-28318-5 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.17 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | U |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | TBX |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM080000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | U |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | TBX |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.09 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Dooley, John F. |
Relator term | author. |
Relator code | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
245 14 - TITLE STATEMENT | |
Title | The Gambler and the Scholars |
Medium | [electronic resource] : |
Remainder of title | Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology / |
Statement of responsibility, etc | by John F. Dooley. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIII, 332 p. 1 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | History of Computing, |
International Standard Serial Number | 2190-684X |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Introduction -- 2. Beginnings – Herbert Yardley -- 3. Beginnings – William Friedman and Elizebeth Smith -- 4. The Great War – Meetings -- 5. Wars End -- 6. What Might Have Been -- 7. The Cipher Bureau: Early Days -- 8. The Lone Cryptologists: Escape from Riverbank -- 9. The Cipher Bureau: Success and Decline -- 10. The Lone Cryptologists: Washington Life -- 11. Cryptologic Endings and Beginnings -- 12. The American Black Chamber -- 13. A Pretty Young Woman in a Pink Dress -- 14. One Career After Another -- 15. Red and Purple -- 16. Yardley Abroad -- 17. The Friedmans at War – William -- 18. The Friedmans at War – Elizebeth -- 19. Yardley’s War -- 20. Endings -- 21. Memories of Friedman and Yardley -- Appendix - A Few Words of Cryptology -- Bibliography -- Photo and Illustration Credits. |
520 ## - SUMMARY, ETC. | |
Summary, etc | In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the Army’s Military Intelligence Division to create a code and cipher section for the Army with himself as its head. These two seminal events were the beginning of modern American cryptology, the growth of which culminated 35 years later with the creation of the National Security Agency. Each running their own cryptologic agencies in the 1920s, the Friedman-Yardley relationship was shattered after Yardley published a tell-all book about his time in military intelligence. Yet in the end, the work they all started in 1917 led directly to the modern American intelligence community. As they got older, they became increasingly irrelevant in the burgeoning American cryptologic fraternity. Topics and features: * Examines the lives of three remarkable and pioneering cryptologists * Offers fascinating insights into spies, codes and ciphers, rumrunners, poker, and military history * Sheds new light on interesting parts of the cryptologists’ careers—especially Elizebeth Friedman, whose work during World War II has just begun to be explored * Recounts several good stories, i.e., What if the Friedmans had gone to work for Herbert Yardley in his new Cipher Bureau in 1919? What if Yardley had moved back to Washington to work for William Friedman a decade later? This enjoyable book has wide appeal for: general readers interested in the evolution of American cryptology, American historians (particularly of World War I, the inter-war period, and World War II signals intelligence), and historians of—and general readers interested in—American military intelligence. It also can be used as an auxiliary text or recommended reading in introductory or survey courses in history or on the related topics. John F. Dooley is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College in Galesburg, Illinois. Previously, he spent more than 15 years in the software industry working for such companies as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. His other Springer publications include Codes, Ciphers and Spies and the award-winning History of Cryptography and Cryptanalysis. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers |
General subdivision | History. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | History of Computing. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data and Information Security. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031283178 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031283192 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031283208 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | History of Computing, |
-- | 2190-684X |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-28318-5">https://doi.org/10.1007/978-3-031-28318-5</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.