0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (31)
  • R500 - R1,000 (5)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 25 of 37 matches in All Departments

Technical Articles about the Voynich Manuscript (Hardcover): National Security Agency Technical Articles about the Voynich Manuscript (Hardcover)
National Security Agency
R597 Discovery Miles 5 970 Ships in 10 - 15 working days
New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover): National Security Agency New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover)
National Security Agency
R539 Discovery Miles 5 390 Ships in 10 - 15 working days
European Axis Signal Intelligence in World War II (Hardcover): National Security Agency, Army Security Agency European Axis Signal Intelligence in World War II (Hardcover)
National Security Agency, Army Security Agency
R2,404 Discovery Miles 24 040 Ships in 10 - 15 working days

An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.

The volumes include:

Volume I: Synopsis

Volume 2: Notes on German High Level Cryptography and Cryptanalysis

Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces

Volume 4: The Signal Intelligence Service of the Army High Command

Volume 5: The German Air Force Signal Intelligence Service

Volume 6: The Foreign Office Cryptanalytic Section

Volume 7: Goering's "Research" Bureau

Volume 8: Miscellaneous

Volume 9: German Traffic Analysis of Russian Communications

Seward's Other Folly - America's First Encrypted Cable (Paperback): National Security Agency Seward's Other Folly - America's First Encrypted Cable (Paperback)
National Security Agency; Edited by Penny Hill Press; Ralph E. Weber
R310 Discovery Miles 3 100 Ships in 18 - 22 working days
Network Infrastructure Division Systems and Network Analysis Center - Activating Authentication and Encryption for Cisco... Network Infrastructure Division Systems and Network Analysis Center - Activating Authentication and Encryption for Cisco Unified Communications Manager Express (CUCME) 7.0/4.3 (Paperback)
National Security Agency
R384 Discovery Miles 3 840 Ships in 18 - 22 working days
Information Assurance Directorate - Deploying and Securitign Google Chrome in a Windows Enterprise (Paperback): National... Information Assurance Directorate - Deploying and Securitign Google Chrome in a Windows Enterprise (Paperback)
National Security Agency
R388 Discovery Miles 3 880 Ships in 18 - 22 working days
Listening the the Rumrunners - Radio Intelligence during Prohibition (Paperback): National Security Agency Listening the the Rumrunners - Radio Intelligence during Prohibition (Paperback)
National Security Agency
R360 Discovery Miles 3 600 Ships in 18 - 22 working days
Information Assurance Directorate - NSA Community Gold Standard Technical Guidanc (Paperback): National Security Agency Information Assurance Directorate - NSA Community Gold Standard Technical Guidanc (Paperback)
National Security Agency
R388 Discovery Miles 3 880 Ships in 18 - 22 working days
A History of U.S. Communications Intelligence during World War II - Policy and Administration (Paperback): Inc Penny Hill Press A History of U.S. Communications Intelligence during World War II - Policy and Administration (Paperback)
Inc Penny Hill Press; National Security Agency
R436 Discovery Miles 4 360 Ships in 18 - 22 working days
Information Assurance Directorate - Deploying Signed BIOSes to Enterprise Client Sysytems (Paperback): National Security Agency Information Assurance Directorate - Deploying Signed BIOSes to Enterprise Client Sysytems (Paperback)
National Security Agency
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
Background to Assessing Russian Activities and Intentions in Recent US Elections - The Analytic Process and Cyber Incident... Background to Assessing Russian Activities and Intentions in Recent US Elections - The Analytic Process and Cyber Incident Attribution (Paperback)
The Federal Bureau of Investigation, The National Security Agency; Edited by Penny Hill Press
R360 Discovery Miles 3 600 Ships in 18 - 22 working days
Hidden Data and Metadata in Adobe PDF Files - Publication Risks and Countermeasures Enterprise Applications Division of the... Hidden Data and Metadata in Adobe PDF Files - Publication Risks and Countermeasures Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate (Paperback)
National Security Agency
R382 Discovery Miles 3 820 Ships in 18 - 22 working days
Guidance for Addressing Malicious Code Risk (Paperback): National Security Agency Guidance for Addressing Malicious Code Risk (Paperback)
National Security Agency
R406 Discovery Miles 4 060 Ships in 18 - 22 working days
Microsoft Office 2000 Executable Content Security Risks and Countermeasures (Paperback): National Security Agency Microsoft Office 2000 Executable Content Security Risks and Countermeasures (Paperback)
National Security Agency
R411 Discovery Miles 4 110 Ships in 18 - 22 working days
The Case for Using Layered Defenses to Stop Worms (Paperback): National Security Agency The Case for Using Layered Defenses to Stop Worms (Paperback)
National Security Agency
R393 Discovery Miles 3 930 Ships in 18 - 22 working days
Guide to Sun Microsystems Java Plug-in Security (Paperback): National Security Agency Guide to Sun Microsystems Java Plug-in Security (Paperback)
National Security Agency
R381 Discovery Miles 3 810 Ships in 18 - 22 working days
Breaking the Enigma Code (Paperback): United States National Security Agency Breaking the Enigma Code (Paperback)
United States National Security Agency
R289 Discovery Miles 2 890 Ships in 18 - 22 working days

As the German military grew in the late 1920s, it began looking for a better way to secure its communications. It found the answer in a new cryptographic machine called "Enigma." The Germans believed the encryption generated by the machine to be unbreakable. With a theoretical number of ciphering possibilities of 3 X 10114, their belief was not unjustified.1 However, they never reached that theoretical level of security. Nor did they count on the cryptanalytic abilities of their adversaries. The Enigma machine based its cipher capabilities on a series of wired rotor wheels and a plugboard. Through a web of internal wiring, each of the 26 input contacts on the rotor were connected to a different output contact. The wiring connections of one rotor differed from the connections on any other rotor. Additionally, each rotor had a moveable placement notch found on an outer ring. The notch forced the rotor to its left to step one place forward. This notch could be moved to a different point on the rotor by rotating the outer ring. The Germans followed a daily list, known as a key list, to indicate where the notch should be placed each day. Another complication to the machine involved the plugboard, which the Germans called a "Stecker." The plugboard simply connected one letter to a different letter. That also meant that the second letter automatically connected back to the first. Again, the key list indicated which letters should be connected for that day. Each day, the Germans followed the key list to plug the plugboard connections, select the rotors to be placed in the machine, change the rotor notch placement, and place the rotors in the left, center, or right position within the machine. Finally, the code clerk chose which three letters were to appear through three small windows next to the rotors. These letters indicated the initial rotor settings for any given message, and the code clerk changed those settings with every message he sent. The path the electrical current took initiated with the keystroke. The current passed through the plugboard, changing its path if that letter was plugged to a different letter. From there it entered the first, or rightmost, rotor at the input contact. The rotor wiring redirected it to a different output that went directly into the next rotor's input. After passing through, and changing directions in each rotor, the current entered a reflecting plate. This plate not only changed the "letter," but also sent the current back through the rotors, again resulting in three more changes. The current made one last pass through the stecker and finally on to the light panel where the cipher letter lit up. To decipher an Enigma message, the recipient had to have an Enigma with the same plugboard connections, rotors, notch placement, left/center/right positions, and initial settings. This enabled the current to follow the same pathway in reverse and resulted in the plaintext letter lighting up on the light panel. The Germans, with their published key lists, had the necessary information. The Allies did not. The Enigma eliminated whatever intricacies a language may possess that previous methods of cryptanalysis exploited. One such practice was frequency counts. Certain letters in any language are used more often than others. By counting which cipher letters appeared most often, cryptanalysts could make an assumption about which plaintext letter they represented. Machine encryption like the Enigma destroyed the frequency counts. Cipher letters tended to appear equally often.

Information Assurance Directorate - Spotting the Adversary with Windows Event Log Monitoring (Paperback): National Security... Information Assurance Directorate - Spotting the Adversary with Windows Event Log Monitoring (Paperback)
National Security Agency
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System - Systems... National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System - Systems Security Engineering (Paperback)
National Security Agency
R458 Discovery Miles 4 580 Ships in 18 - 22 working days
Network Infrastructure Division Systems and Network Analysis Center - Activating Authentication and Encryption for Cisco... Network Infrastructure Division Systems and Network Analysis Center - Activating Authentication and Encryption for Cisco CallManager 4.(x) (Paperback)
National Security Agency
R382 Discovery Miles 3 820 Ships in 18 - 22 working days
Brigadier John Tiltman - A Giant Among Cryptanalysts (Paperback): National Security Agency, Center for Cryptologic History Brigadier John Tiltman - A Giant Among Cryptanalysts (Paperback)
National Security Agency, Center for Cryptologic History
R465 Discovery Miles 4 650 Ships in 18 - 22 working days

Brigadier John Tiltman has been variously described as the greatest cryptanalyst of his time, the vest cryptanalyst ever to work for Government Communications Headquarters (CGHQ, Great Britain's counterpart to NSA), and a legend in his own time." He led the attack on numerous code and cipher systems over a dozen countries. At the same time he developed cipher systems for his own country that were unbreakable during the time they were used. He held the title of Chief Cryptographer for the Government Code and Cypher School. His career spanned two world wars, conflicts in Korea and Vietnam, and most of the Cold War.

Network Applications Team of the Systems and Network Attack Center (Paperback): National Security Agency Network Applications Team of the Systems and Network Attack Center (Paperback)
National Security Agency
R420 Discovery Miles 4 200 Ships in 18 - 22 working days
Oracle Application Server on Windows 2003 Security Guide Enterprise Applications Division of the Systems and Network Attack... Oracle Application Server on Windows 2003 Security Guide Enterprise Applications Division of the Systems and Network Attack Center (SNAC) (Paperback)
National Security Agency
R408 Discovery Miles 4 080 Ships in 18 - 22 working days
VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC)... VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) (Paperback)
National Security Agency
R408 Discovery Miles 4 080 Ships in 18 - 22 working days
COMINT and the Sinking of the Battleship YAMATO - Enhanced with Text Analytics and Content by PageKicker Robot Jellicoe... COMINT and the Sinking of the Battleship YAMATO - Enhanced with Text Analytics and Content by PageKicker Robot Jellicoe (Paperback)
Pagekicker Robot Jellicoe, National Security Agency
R467 Discovery Miles 4 670 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teaching Music Appreciation Online
Bethanie L. Hansen Hardcover R2,713 Discovery Miles 27 130
Microeconomics - South African Edition
Gregory Mankiw, Mark Taylor, … Hardcover R577 Discovery Miles 5 770
Blessed - A Red Hardcover Decorative…
Murre Book Decor Hardcover R855 Discovery Miles 8 550
The Real Interior
Nthabi Taukobong Paperback R275 R246 Discovery Miles 2 460
Accent Pieces - Collected Writings and…
Amy Mangan Hardcover R661 Discovery Miles 6 610
Thankful - A Red Hardcover Decorative…
Murre Book Decor Hardcover R855 Discovery Miles 8 550
Consequences of Compassion - An…
Charles Goodman Hardcover R2,803 Discovery Miles 28 030
Mandala Coloring Book - For All Ages
Jim Stephens Paperback R214 Discovery Miles 2 140
Big Panda And Tiny Dragon
James Norbury Hardcover  (1)
R505 R466 Discovery Miles 4 660
Style - Hardcover Black Decorative Book…
Murre Book Decor Hardcover R855 Discovery Miles 8 550

 

Partners