Passwords : Philology, Security, Authentication /
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should b...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge, MA :
Harvard University Press,
[2018]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | DEGRUYTERUP_9780674985391 | ||
003 | DE-B1597 | ||
005 | 20210824034702.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 210824t20182018mau fo d z eng d | ||
020 | |a 9780674985391 | ||
024 | 7 | |a 10.4159/9780674985391 |2 doi | |
035 | |a (DE-B1597)501447 | ||
035 | |a (OCoLC)1030304482 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a mau |c US-MA | ||
050 | 4 | |a QA76.9.A25 |b L485 2018eb | |
072 | 7 | |a COM080000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8/24 |2 23 |
100 | 1 | |a Lennon, Brian, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Passwords : |b Philology, Security, Authentication / |c Brian Lennon. |
264 | 1 | |a Cambridge, MA : |b Harvard University Press, |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (232 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
505 | 0 | 0 | |t Frontmatter -- |t Contents -- |t Preface -- |t 1. Passwords: Philology, Security, Authentication -- |t 2. Cryptophilology, I -- |t 3. Machine Translation: A Tale of Two Cultures -- |t 4. Cryptophilology, II -- |t 5. The Digital Humanities and National Security -- |t Notes -- |t Acknowledgments -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing's humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon's history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist's scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing-passwords-that many of us use every day. | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021) | |
650 | 0 | |a Computers |x Access control |x Passwords. | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Electronic surveillance. | |
650 | 0 | |a Philology. | |
650 | 7 | |a COMPUTERS / History. |2 bisacsh | |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t Harvard University Press Complete eBook-Package 2018 |z 9783110606621 |
856 | 4 | 0 | |u https://doi.uam.elogim.com/10.4159/9780674985391 |z Texto completo |
856 | 4 | 0 | |u https://degruyter.uam.elogim.com/isbn/9780674985391 |z Texto completo |
912 | |a 978-3-11-060662-1 Harvard University Press Complete eBook-Package 2018 |b 2018 | ||
912 | |a GBV-deGruyter-alles |