The Gambler and the Scholars (Record no. 15190)

MARC details
000 -LEADER
fixed length control field 03373nam a2200313Ia 4500
000 - LEADER
fixed length control field 04512nam a22003495i 4500
001 - CONTROL NUMBER
control field 978-3-031-28318-5
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240319120853.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230405s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031283185
-- 978-3-031-28318-5
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 4.09
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Dooley, John F.
9 (RLIN) 31166
245 ## - TITLE STATEMENT
Title The Gambler and the Scholars
Statement of responsibility, etc. by John F. Dooley.
Medium [electronic resource] :
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer Nature Switzerland
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 332 p. 1 illus.
Other physical details online resource.
520 ## - SUMMARY, ETC.
Summary, etc. In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the Army's Military Intelligence Division to create a code and cipher section for the Army with himself as its head. These two seminal events were the beginning of modern American cryptology, the growth of which culminated 35 years later with the creation of the National Security Agency. Each running their own cryptologic agencies in the 1920s, the Friedman-Yardley relationship was shattered after Yardley published a tell-all book about his time in military intelligence. Yet in the end, the work they all started in 1917 led directly to the modern American intelligence community. As they got older, they became increasingly irrelevant in the burgeoning American cryptologic fraternity. Topics and features: * Examines the lives of three remarkable and pioneering cryptologists * Offers fascinating insights into spies, codes and ciphers, rumrunners, poker, and military history * Sheds new light on interesting parts of the cryptologists' careers-especially Elizebeth Friedman, whose work during World War II has just begun to be explored * Recounts several good stories, i.e., What if the Friedmans had gone to work for Herbert Yardley in his new Cipher Bureau in 1919? What if Yardley had moved back to Washington to work for William Friedman a decade later? This enjoyable book has wide appeal for: general readers interested in the evolution of American cryptology, American historians (particularly of World War I, the inter-war period, and World War II signals intelligence), and historians of-and general readers interested in-American military intelligence. It also can be used as an auxiliary text or recommended reading in introductory or survey courses in history or on the related topics. John F. Dooley is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College in Galesburg, Illinois. Previously, he spent more than 15 years in the software industry working for such companies as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. His other Springer publications include Codes, Ciphers and Spies and the award-winning History of Cryptography and Cryptanalysis.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
9 (RLIN) 31167
Topical term or geographic name entry element Cryptography.
9 (RLIN) 31168
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31169
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31170
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 31171
Topical term or geographic name entry element Data protection.
9 (RLIN) 31172
Topical term or geographic name entry element History of Computing.
9 (RLIN) 31173
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-28318-5">https://doi.org/10.1007/978-3-031-28318-5</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
        S. R. Ranganathan Learning Hub S. R. Ranganathan Learning Hub Online   Veda Library Solutions Pvt. Ltd., Noida   EB2176 2024-03-19 2024-03-19 e-Book Platform:Springer