How I discovered World War II's greatest spy : and other stories of intelligence and code /
INTRODUCTIONHow I Discovered World War II's Greatest Spy Who Was the Greatest Spy of World War II? AMERICAN STORIESDid Roosevelt Know? Pearl Harbor and the Inadequacy of Cryptanalysis Appendix: A Japanese CryptosystemThe Woman Who Made the Key DiscoveryHow the United States Viewed Germany and J...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press, Taylor & Francis Group,
[2014]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Front Cover; Contents; Foreword; Preface; Chapter 1: How I Discovered World War II's Greatest Spy; Chapter 2: Did Roosevelt Know?; Chapter 3: Pearl Harbor and the Inadequacy of Cryptanalysis; Chapter 4: How the United States Viewed Germany and Japan in 1941; Chapter 5: Roosevelt, Magic, and Ultra; Chapter 6: Edward Bell and His Zimmermann Telegram Memoranda; Chapter 7: Cryptology and the Origins of Spread Spectrum; Chapter 8: The Rise of Intelligence; Chapter 9: Intelligence in World War II: A Survey; Chapter 10: Why Germany's Intelligence Failed in World War II
- Chapter 11: An Enigma ChronologyChapter 12: The Black Code; Chapter 13: Nothing Sacred: The Allied Solution of Vatican Codes in World War II; Chapter 14: Finland's Codebreaking in World War II; Chapter 15: Soviet Comint in the Cold War; Chapter 16: How the Allies Suppressed the Second Greatest Secret of World War II; Chapter 17: An Historical Theory of Intelligence; Chapter 18: Clausewitz on Intelligence; Chapter 19: Surprise and Secrecy: Two Thoughts; Chapter 20: Intelligence Lessons in Macbeth; Chapter 21: How Garbles Tickled History; Chapter 22: The Cryptologic Origin of Braille
- Chapter 23: The Only False Message I KnowChapter 24: The Prehistory of the General Staff; Chapter 25: Charles J. Mendelsohn and Why I Envy Him; Chapter 26: The Man in the Iron Mask: Encore et Enfin, Cryptologically; Chapter 27: Students Better than a Pro (Bazeries) and an Author (Candela); Chapter 28: The Old Master of Austrian Cryptology; Chapter 29: Enigma Uncracked: The Allies Fail to Break the German Cipher Machine; Chapter 30: The Future of the Past: Questions in Cryptologic History; Back Cover