Code Breaking in the Pacific (Record no. 57230)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03828nam a22005655i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-08278-3 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421112051.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140814s2014 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319082783 |
-- | 978-3-319-08278-3 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.74 |
100 1# - AUTHOR NAME | |
Author | Donovan, Peter. |
245 10 - TITLE STATEMENT | |
Title | Code Breaking in the Pacific |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XXVI, 387 p. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Communications and Sigint -- Japanese Expansion 1895-1941 -- The GCCS 1919-1941 -- William Friedman and the US Army -- Early American Naval Sigint -- Developments in Australia -- Preparedness for Attack?- Major Technical Encryption Systems -- JN-25 and its Cryptanalysis -- Using Common Book Groups -- Recovery of a Code Book -- Breaking Additive Systems -- Making Additive Systems Secure -- Redundant Encryption -- The Scanning Distribution -- Ciphers and the Submarines -- Central Bureau 1942-1945 -- Organisation and Reorganisation -- Security, Censorship and Leaks -- Conclusion -- From Pearl Harbor to Midway -- Guadalcanal and Papua -- Rabaul and the Philippines. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Mathematics. |
700 1# - AUTHOR 2 | |
Author 2 | Mack, John. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-08278-3 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2014. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Coding theory. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Structures, Cryptology and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Coding and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Math Applications in Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | History of Computing. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
912 ## - | |
-- | ZDB-2-SCS |
No items available.