Book description
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Foreword
- Preface
- Chapter 1: How I Discovered World War IIâs Greatest Spy (1/4)
- Chapter 1: How I Discovered World War IIâs Greatest Spy (2/4)
- Chapter 1: How I Discovered World War IIâs Greatest Spy (3/4)
- Chapter 1: How I Discovered World War IIâs Greatest Spy (4/4)
- Chapter 2: Did Roosevelt Know? (1/2)
- Chapter 2: Did Roosevelt Know? (2/2)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (1/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (2/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (3/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (4/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (5/5)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (1/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (2/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (3/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (4/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (5/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (6/6)
- Chapter 5: Roosevelt, Magic, and Ultra (1/7)
- Chapter 5: Roosevelt, Magic, and Ultra (2/7)
- Chapter 5: Roosevelt, Magic, and Ultra (3/7)
- Chapter 5: Roosevelt, Magic, and Ultra (4/7)
- Chapter 5: Roosevelt, Magic, and Ultra (5/7)
- Chapter 5: Roosevelt, Magic, and Ultra (6/7)
- Chapter 5: Roosevelt, Magic, and Ultra (7/7)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (1/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (2/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (3/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (4/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (5/5)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (1/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (2/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (3/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (4/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (5/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (6/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (7/7)
- Chapter 8: The Rise of Intelligence (1/4)
- Chapter 8: The Rise of Intelligence (2/4)
- Chapter 8: The Rise of Intelligence (3/4)
- Chapter 8: The Rise of Intelligence (4/4)
- Chapter 9: Intelligence in World War II: A Survey (1/5)
- Chapter 9: Intelligence in World War II: A Survey (2/5)
- Chapter 9: Intelligence in World War II: A Survey (3/5)
- Chapter 9: Intelligence in World War II: A Survey (4/5)
- Chapter 9: Intelligence in World War II: A Survey (5/5)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (1/7)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (2/7)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (3/7)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (4/7)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (5/7)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (6/7)
- Chapter 10: Why Germanyâs Intelligence Failed in World War II (7/7)
- Chapter 11: An Enigma Chronology (1/2)
- Chapter 11: An Enigma Chronology (2/2)
- Chapter 12: The Black Code (1/4)
- Chapter 12: The Black Code (2/4)
- Chapter 12: The Black Code (3/4)
- Chapter 12: The Black Code (4/4)
- Chapter 13: Nothing Sacred: The Allied Solution of Vatican Codes in World War II (1/2)
- Chapter 13: Nothing Sacred: The Allied Solution of Vatican Codes in World War II (2/2)
- Chapter 14: Finlandâs Codebreaking in World War II (1/4)
- Chapter 14: Finlandâs Codebreaking in World War II (2/4)
- Chapter 14: Finlandâs Codebreaking in World War II (3/4)
- Chapter 14: Finlandâs Codebreaking in World War II (4/4)
- Chapter 15: Soviet Comint in the Cold War (1/5)
- Chapter 15: Soviet Comint in the Cold War (2/5)
- Chapter 15: Soviet Comint in the Cold War (3/5)
- Chapter 15: Soviet Comint in the Cold War (4/5)
- Chapter 15: Soviet Comint in the Cold War (5/5)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (1/4)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (2/4)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (3/4)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (4/4)
- Chapter 17: An Historical Theory of Intelligence (1/4)
- Chapter 17: An Historical Theory of Intelligence (2/4)
- Chapter 17: An Historical Theory of Intelligence (3/4)
- Chapter 17: An Historical Theory of Intelligence (4/4)
- Chapter 18: Clausewitz on Intelligence (1/3)
- Chapter 18: Clausewitz on Intelligence (2/3)
- Chapter 18: Clausewitz on Intelligence (3/3)
- Chapter 19: Surprise and Secrecy: Two Thoughts
- Chapter 20: Intelligence Lessons in Macbeth
- Chapter 21: How Garbles Tickled History (1/2)
- Chapter 21: How Garbles Tickled History (2/2)
- Chapter 22: The Cryptologic Origin of Braille
- Chapter 23: The Only False Message I Know
- Chapter 24: The Prehistory of the General Staff (1/2)
- Chapter 24: The Prehistory of the General Staff (2/2)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (1/4)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (2/4)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (3/4)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (4/4)
- Chapter 26: The Man in the Iron Mask: Encore et Enfin, Cryptologically (1/2)
- Chapter 26: The Man in the Iron Mask: Encore et Enfin, Cryptologically (2/2)
- Chapter 27: Students Better than a Pro (Bazeries) and an Author (Candela)
- Chapter 28: The Old Master of Austrian Cryptology (1/2)
- Chapter 28: The Old Master of Austrian Cryptology (2/2)
- Chapter 29: Enigma Uncracked: The Allies Fail to Break the German Cipher Machine (1/2)
- Chapter 29: Enigma Uncracked: The Allies Fail to Break the German Cipher Machine (2/2)
- Chapter 30: The Future of the Past: Questions in Cryptologic History (1/2)
- Chapter 30: The Future of the Past: Questions in Cryptologic History (2/2)
- Back Cover
Product information
- Title: How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code
- Author(s):
- Release date: January 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781466562042
You might also like
book
Advanced Mathematics
Provides a smooth and pleasant transition from first-year calculus to upper-level mathematics courses in real analysis, …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Security in Computing
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of …
book
Introduction to Cryptography with Coding Theory, 3rd Edition
For courses in Cryptography, Network Security, and Computer Security. This ISBN is for the Pearson eText …