Book description
This book recounts the desperate efforts to gather information during World War II and the Cold War. The author provides insight into the dark realm of intelligence and code that will fascinate cryptographers, intelligence personnel, and the millions of people interested in military history, espionage adventure, and world affairs.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Foreword
- Preface
- Chapter 1: How I Discovered World War II’s Greatest Spy (1/4)
- Chapter 1: How I Discovered World War II’s Greatest Spy (2/4)
- Chapter 1: How I Discovered World War II’s Greatest Spy (3/4)
- Chapter 1: How I Discovered World War II’s Greatest Spy (4/4)
- Chapter 2: Did Roosevelt Know? (1/2)
- Chapter 2: Did Roosevelt Know? (2/2)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (1/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (2/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (3/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (4/5)
- Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis (5/5)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (1/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (2/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (3/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (4/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (5/6)
- Chapter 4: How the United States Viewed Germany and Japan in 1941 (6/6)
- Chapter 5: Roosevelt, Magic, and Ultra (1/7)
- Chapter 5: Roosevelt, Magic, and Ultra (2/7)
- Chapter 5: Roosevelt, Magic, and Ultra (3/7)
- Chapter 5: Roosevelt, Magic, and Ultra (4/7)
- Chapter 5: Roosevelt, Magic, and Ultra (5/7)
- Chapter 5: Roosevelt, Magic, and Ultra (6/7)
- Chapter 5: Roosevelt, Magic, and Ultra (7/7)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (1/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (2/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (3/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (4/5)
- Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda (5/5)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (1/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (2/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (3/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (4/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (5/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (6/7)
- Chapter 7: Cryptology and the Origins of Spread Spectrum (7/7)
- Chapter 8: The Rise of Intelligence (1/4)
- Chapter 8: The Rise of Intelligence (2/4)
- Chapter 8: The Rise of Intelligence (3/4)
- Chapter 8: The Rise of Intelligence (4/4)
- Chapter 9: Intelligence in World War II: A Survey (1/5)
- Chapter 9: Intelligence in World War II: A Survey (2/5)
- Chapter 9: Intelligence in World War II: A Survey (3/5)
- Chapter 9: Intelligence in World War II: A Survey (4/5)
- Chapter 9: Intelligence in World War II: A Survey (5/5)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (1/7)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (2/7)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (3/7)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (4/7)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (5/7)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (6/7)
- Chapter 10: Why Germany’s Intelligence Failed in World War II (7/7)
- Chapter 11: An Enigma Chronology (1/2)
- Chapter 11: An Enigma Chronology (2/2)
- Chapter 12: The Black Code (1/4)
- Chapter 12: The Black Code (2/4)
- Chapter 12: The Black Code (3/4)
- Chapter 12: The Black Code (4/4)
- Chapter 13: Nothing Sacred: The Allied Solution of Vatican Codes in World War II (1/2)
- Chapter 13: Nothing Sacred: The Allied Solution of Vatican Codes in World War II (2/2)
- Chapter 14: Finland’s Codebreaking in World War II (1/4)
- Chapter 14: Finland’s Codebreaking in World War II (2/4)
- Chapter 14: Finland’s Codebreaking in World War II (3/4)
- Chapter 14: Finland’s Codebreaking in World War II (4/4)
- Chapter 15: Soviet Comint in the Cold War (1/5)
- Chapter 15: Soviet Comint in the Cold War (2/5)
- Chapter 15: Soviet Comint in the Cold War (3/5)
- Chapter 15: Soviet Comint in the Cold War (4/5)
- Chapter 15: Soviet Comint in the Cold War (5/5)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (1/4)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (2/4)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (3/4)
- Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II (4/4)
- Chapter 17: An Historical Theory of Intelligence (1/4)
- Chapter 17: An Historical Theory of Intelligence (2/4)
- Chapter 17: An Historical Theory of Intelligence (3/4)
- Chapter 17: An Historical Theory of Intelligence (4/4)
- Chapter 18: Clausewitz on Intelligence (1/3)
- Chapter 18: Clausewitz on Intelligence (2/3)
- Chapter 18: Clausewitz on Intelligence (3/3)
- Chapter 19: Surprise and Secrecy: Two Thoughts
- Chapter 20: Intelligence Lessons in Macbeth
- Chapter 21: How Garbles Tickled History (1/2)
- Chapter 21: How Garbles Tickled History (2/2)
- Chapter 22: The Cryptologic Origin of Braille
- Chapter 23: The Only False Message I Know
- Chapter 24: The Prehistory of the General Staff (1/2)
- Chapter 24: The Prehistory of the General Staff (2/2)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (1/4)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (2/4)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (3/4)
- Chapter 25: Charles J. Mendelsohn and Why I Envy Him (4/4)
- Chapter 26: The Man in the Iron Mask: Encore et Enfin, Cryptologically (1/2)
- Chapter 26: The Man in the Iron Mask: Encore et Enfin, Cryptologically (2/2)
- Chapter 27: Students Better than a Pro (Bazeries) and an Author (Candela)
- Chapter 28: The Old Master of Austrian Cryptology (1/2)
- Chapter 28: The Old Master of Austrian Cryptology (2/2)
- Chapter 29: Enigma Uncracked: The Allies Fail to Break the German Cipher Machine (1/2)
- Chapter 29: Enigma Uncracked: The Allies Fail to Break the German Cipher Machine (2/2)
- Chapter 30: The Future of the Past: Questions in Cryptologic History (1/2)
- Chapter 30: The Future of the Past: Questions in Cryptologic History (2/2)
- Back Cover
Product information
- Title: How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code
- Author(s):
- Release date: January 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781466562042
You might also like
book
The Art of Cyberwarfare
Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by …
audiobook
Fall in Love with the Problem, Not the Solution
Unicorns-companies that reach a valuation of more than $1 billion-are rare. Uri Levine has built two. …
book
Entrepreneurs Who Changed History
Whether titans of industry, influential business leaders, or creators of history's most recognizable brands, these entrepreneurs …
book
Cyber Warfare – Truth, Tactics, and Strategies
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that …