|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_on1030304482 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
180403t20182018mau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d YDX
|d OCLCF
|d IDB
|d CEF
|d DEGRU
|d UAB
|d OCLCQ
|d LVT
|d OCLCQ
|d IBI
|d K6U
|d JSTOR
|d OCLCO
|d DST
|d OCLCO
|d OCL
|d OCLCQ
|d BRX
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9780674985391
|q (electronic bk.)
|
020 |
|
|
|a 0674985397
|q (electronic bk.)
|
020 |
|
|
|z 9780674980761
|q (hardcover)
|
020 |
|
|
|z 067498076X
|q (hardcover)
|
035 |
|
|
|a (OCoLC)1030304482
|
037 |
|
|
|a 22573/ctv24sq8v5
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b L485 2018eb
|
072 |
|
7 |
|a COM
|x 083000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 080000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 052000
|2 bisacsh
|
072 |
|
7 |
|a LAN
|x 009000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/24
|2 23
|
084 |
|
|
|a AP 15840
|2 rvk
|0 (DE-625)rvk/6942:
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lennon, Brian,
|d 1971-
|e author.
|
245 |
1 |
0 |
|a Passwords :
|b philology, security, authentication /
|c Brian Lennon.
|
264 |
|
1 |
|a Cambridge, Massachusetts ;
|a London, England :
|b The Belknap Press of Harvard University Press,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (xviii, 207 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--
|c Provided by publisher.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Passwords : philology, security, authentication --
|t Cryptophilology, I --
|t Machine translation : a tale of two cultures --
|t Cryptophilology, II --
|t The digital humanities and national security.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computers
|x Access control
|x Passwords.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Philology.
|
650 |
|
0 |
|a Electronic surveillance.
|
650 |
|
0 |
|a Philology, Modern.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle
|x Mots de passe.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Philologie.
|
650 |
|
6 |
|a Surveillance électronique.
|
650 |
|
7 |
|a philology.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS / History
|2 bisacsh
|
650 |
|
7 |
|a Philology, Modern
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|x Passwords
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a Electronic surveillance
|2 fast
|
650 |
|
7 |
|a Philology
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Lennon, Brian, 1971-
|t Passwords.
|d Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018
|z 9780674980761
|w (DLC) 2017031078
|w (OCoLC)1000527025
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv24trbx1
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9780674985391
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5334150
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1743338
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15207437
|
994 |
|
|
|a 92
|b IZTAP
|