Catalog Search Results
Author
Series
Accelerated Reader
IL: MG - BL: 6.9 - AR Pts: 1
Language
English
Formats
Description
This book teaches students how to analyze patterns though cryptography. Illustrates and explains how use a cipher to encrypt and decrypt simple substitution ciphers, poly-alphabetic ciphers and transposition ciphers. Includes famous examples of encrypted messages about and by figures like Julius Caesar and Queen Elizabeth I.
Author
Publisher
Bloomsbury
Pub. Date
[2019]
Language
English
Description
"Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting...
10) The Medusa plot
Author
Series
Accelerated Reader
IL: MG - BL: 5.3 - AR Pts: 7
Language
English
Formats
Description
Thirteen-year-old Dan Cahill and his older sister, Amy, thought the search for the thirty-nine clues leading to the source of their family's power was over, but when Cahills are kidnapped by the Vespers, Amy and Dan find themselves with only a few day to fulfill a bizarre ransom request before their friends start dying.
Author
Language
English
Description
1940. As England prepares to fight the Nazis, three very different women answer the call to mysterious country estate Bletchley Park, where the best minds in Britain train to break German military codes. Vivacious debutante Osla is the girl who has everything—beauty, wealth, and the dashing Prince Philip of Greece sending her roses—but she burns to prove herself as more than a society girl, and puts her fluent German to use as a translator of...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Publisher
Henry Holt and Company
Pub. Date
2022.
Accelerated Reader
IL: MG - BL: 7.7 - AR Pts: 8
Language
English
Description
A nonfiction manuscript for young readers about a group of Allied spies and codebreakers that cracked the Nazis's infamous cypher, allowing them to read secret military messages and turn the tide of World War II. During WWII, as the Germans waged war, every Nazi plan, every attack, was sent over radio. But to the Allies listening in, the messages sounded like gibberish. The communications were encoded with a powerful cypher-unless you could unlock...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request