000 02019cam a2200337Mi 4500
001 ocn965391910
003 OCoLC
005 20180308100351.0
008 161110s2016 enka j b 001 0 eng
020 _a9780750298858
_q(hbk.)
020 _a9780750298841
020 _a0750298855
_q(hbk.)
020 _a0750298847
029 0 _aAU@
_b000059028590
029 1 _aUNITY
_b138817928
035 _a(OCoLC)965391910
040 _aAU@
_beng
_erda
_cAU@
_dOCLCO
_dOCLCF
_dOCLCQ
_dNZAUC
_dAUHCL
_dOCLCA
_dOCLCQ
_dNSELP
_dATBIA
082 0 4 _a652.8
_223
100 _aApps, Roy,
_eauthor.
_937593
245 1 4 _aThe top secret history of codes and code breaking /
_cby Roy Apps.
260 _aLondon :
_bWayland,
_c2016.
300 _a32 pages;
_bcolour illustrations;
_c26 cm.
504 _aIncludes bibliographical references and index.
505 0 _aWhy we need codes (Shhh! it's a secret) -- Picture codes -- Invisible messages -- Gnitirw sdrawkcab and other letter codes -- Smoke signals and ciphers -- Help! My code has been cracked! -- The unbreakable code -- I don't understand a word you're saying! -- The most useful code ever invented -- The analytical engine -- The Enigma Machine -- The computer as big as a room -- To infinity and beyond -- Glossary.
520 0 _aExplore the history of codes from The Haircut Code, used by the Persians to convey messages in war, to Ancient Hebrew ciphers, pictorial codes of the Egyptians Mayans to letter codes in ancient Rome and substitution ciphers used in Tudor England when the execution of Mary, Queen of Scots was being planned. Find out about modern-day codes, such as tennis players Laura Robson and Heather Watson's 'back slang' when playing doubles and computer codes in the 21st century including the safety of passwords.
650 0 _aCryptography
_vJuvenile literature.
_921925
650 0 _aCiphers
_vJuvenile literature.
_921926
650 0 _aEspionage
_vJuvenile literature.
_921045
942 _2ddc
_cJNONFIC
948 _hHELD BY NZWMT - 60 OTHER HOLDINGS
999 _c40604
_d40604