Passwords :: philology, security, authentication /
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Massachusetts ; London, England :
The Belknap Press of Harvard University Press,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- |
Beschreibung: | 1 online resource (xviii, 207 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780674985391 0674985397 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1030304482 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 180403t20182018mau ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d EBLCP |d YDX |d OCLCF |d IDB |d CEF |d DEGRU |d UAB |d OCLCQ |d LVT |d OCLCQ |d IBI |d K6U |d JSTOR |d OCLCO |d DST |d OCLCO |d OCL |d OCLCQ |d BRX |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9780674985391 |q (electronic bk.) | ||
020 | |a 0674985397 |q (electronic bk.) | ||
020 | |z 9780674980761 |q (hardcover) | ||
020 | |z 067498076X |q (hardcover) | ||
035 | |a (OCoLC)1030304482 | ||
037 | |a 22573/ctv24sq8v5 |b JSTOR | ||
050 | 4 | |a QA76.9.A25 |b L485 2018eb | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
072 | 7 | |a COM |x 080000 |2 bisacsh | |
072 | 7 | |a COM |x 042000 |2 bisacsh | |
072 | 7 | |a SOC |x 052000 |2 bisacsh | |
072 | 7 | |a LAN |x 009000 |2 bisacsh | |
082 | 7 | |a 005.8/24 |2 23 | |
084 | |a AP 15840 |2 rvk |0 (DE-625)rvk/6942: | ||
049 | |a MAIN | ||
100 | 1 | |a Lennon, Brian, |d 1971- |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjCvG9YpWpGPdrwHKRQykC |0 http://id.loc.gov/authorities/names/n2001040203 | |
245 | 1 | 0 | |a Passwords : |b philology, security, authentication / |c Brian Lennon. |
264 | 1 | |a Cambridge, Massachusetts ; |a London, England : |b The Belknap Press of Harvard University Press, |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (xviii, 207 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- |c Provided by publisher. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Passwords : philology, security, authentication -- |t Cryptophilology, I -- |t Machine translation : a tale of two cultures -- |t Cryptophilology, II -- |t The digital humanities and national security. |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computers |x Access control |x Passwords. |0 http://id.loc.gov/authorities/subjects/sh85029555 | |
650 | 0 | |a Cryptography. |0 http://id.loc.gov/authorities/subjects/sh85034453 | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Philology. |0 http://id.loc.gov/authorities/subjects/sh85100821 | |
650 | 0 | |a Electronic surveillance. |0 http://id.loc.gov/authorities/subjects/sh86006641 | |
650 | 0 | |a Philology, Modern. |0 http://id.loc.gov/authorities/subjects/sh85100822 | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle |x Mots de passe. | |
650 | 6 | |a Cryptographie. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Philologie. | |
650 | 6 | |a Surveillance électronique. | |
650 | 7 | |a philology. |2 aat | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a COMPUTERS / History |2 bisacsh | |
650 | 7 | |a Philology, Modern |2 fast | |
650 | 7 | |a Computers |x Access control |x Passwords |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Electronic surveillance |2 fast | |
650 | 7 | |a Philology |2 fast | |
758 | |i has work: |a Passwords (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFFXrRGGpWYgbwdHHkgk6q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Lennon, Brian, 1971- |t Passwords. |d Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018 |z 9780674980761 |w (DLC) 2017031078 |w (OCoLC)1000527025 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1743338 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9780674985391 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5334150 | ||
938 | |a EBSCOhost |b EBSC |n 1743338 | ||
938 | |a YBP Library Services |b YANK |n 15207437 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1030304482 |
---|---|
_version_ | 1816882417508548608 |
adam_text | |
any_adam_object | |
author | Lennon, Brian, 1971- |
author_GND | http://id.loc.gov/authorities/names/n2001040203 |
author_facet | Lennon, Brian, 1971- |
author_role | aut |
author_sort | Lennon, Brian, 1971- |
author_variant | b l bl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 L485 2018eb |
callnumber-search | QA76.9.A25 L485 2018eb |
callnumber-sort | QA 276.9 A25 L485 42018EB |
callnumber-subject | QA - Mathematics |
classification_rvk | AP 15840 |
collection | ZDB-4-EBA |
contents | Passwords : philology, security, authentication -- Cryptophilology, I -- Machine translation : a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. |
ctrlnum | (OCoLC)1030304482 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Allgemeines Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04897cam a2200769 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1030304482</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">180403t20182018mau ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCF</subfield><subfield code="d">IDB</subfield><subfield code="d">CEF</subfield><subfield code="d">DEGRU</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IBI</subfield><subfield code="d">K6U</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674985391</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0674985397</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780674980761</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">067498076X</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1030304482</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctv24sq8v5</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">L485 2018eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">080000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">042000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAN</subfield><subfield code="x">009000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 15840</subfield><subfield code="2">rvk</subfield><subfield code="0">(DE-625)rvk/6942:</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lennon, Brian,</subfield><subfield code="d">1971-</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjCvG9YpWpGPdrwHKRQykC</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001040203</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Passwords :</subfield><subfield code="b">philology, security, authentication /</subfield><subfield code="c">Brian Lennon.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts ;</subfield><subfield code="a">London, England :</subfield><subfield code="b">The Belknap Press of Harvard University Press,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 207 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Passwords : philology, security, authentication --</subfield><subfield code="t">Cryptophilology, I --</subfield><subfield code="t">Machine translation : a tale of two cultures --</subfield><subfield code="t">Cryptophilology, II --</subfield><subfield code="t">The digital humanities and national security.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Passwords.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029555</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034453</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Philology.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85100821</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic surveillance.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh86006641</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Philology, Modern.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85100822</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle</subfield><subfield code="x">Mots de passe.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Philologie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance électronique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">philology.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / History</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Philology, Modern</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Passwords</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic surveillance</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Philology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Passwords (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFFXrRGGpWYgbwdHHkgk6q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Lennon, Brian, 1971-</subfield><subfield code="t">Passwords.</subfield><subfield code="d">Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018</subfield><subfield code="z">9780674980761</subfield><subfield code="w">(DLC) 2017031078</subfield><subfield code="w">(OCoLC)1000527025</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1743338</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9780674985391</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5334150</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1743338</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15207437</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1030304482 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:17Z |
institution | BVB |
isbn | 9780674985391 0674985397 |
language | English |
oclc_num | 1030304482 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xviii, 207 pages) |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | The Belknap Press of Harvard University Press, |
record_format | marc |
spelling | Lennon, Brian, 1971- author. https://id.oclc.org/worldcat/entity/E39PCjCvG9YpWpGPdrwHKRQykC http://id.loc.gov/authorities/names/n2001040203 Passwords : philology, security, authentication / Brian Lennon. Cambridge, Massachusetts ; London, England : The Belknap Press of Harvard University Press, [2018] ©2018 1 online resource (xviii, 207 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- Provided by publisher. Includes bibliographical references and index. Passwords : philology, security, authentication -- Cryptophilology, I -- Machine translation : a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. Print version record. Computers Access control Passwords. http://id.loc.gov/authorities/subjects/sh85029555 Cryptography. http://id.loc.gov/authorities/subjects/sh85034453 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Philology. http://id.loc.gov/authorities/subjects/sh85100821 Electronic surveillance. http://id.loc.gov/authorities/subjects/sh86006641 Philology, Modern. http://id.loc.gov/authorities/subjects/sh85100822 Ordinateurs Accès Contrôle Mots de passe. Cryptographie. Chiffrement (Informatique) Philologie. Surveillance électronique. philology. aat COMPUTERS Security Cryptography. bisacsh COMPUTERS / History bisacsh Philology, Modern fast Computers Access control Passwords fast Cryptography fast Data encryption (Computer science) fast Electronic surveillance fast Philology fast has work: Passwords (Text) https://id.oclc.org/worldcat/entity/E39PCFFXrRGGpWYgbwdHHkgk6q https://id.oclc.org/worldcat/ontology/hasWork Print version: Lennon, Brian, 1971- Passwords. Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018 9780674980761 (DLC) 2017031078 (OCoLC)1000527025 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1743338 Volltext |
spellingShingle | Lennon, Brian, 1971- Passwords : philology, security, authentication / Passwords : philology, security, authentication -- Cryptophilology, I -- Machine translation : a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. Computers Access control Passwords. http://id.loc.gov/authorities/subjects/sh85029555 Cryptography. http://id.loc.gov/authorities/subjects/sh85034453 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Philology. http://id.loc.gov/authorities/subjects/sh85100821 Electronic surveillance. http://id.loc.gov/authorities/subjects/sh86006641 Philology, Modern. http://id.loc.gov/authorities/subjects/sh85100822 Ordinateurs Accès Contrôle Mots de passe. Cryptographie. Chiffrement (Informatique) Philologie. Surveillance électronique. philology. aat COMPUTERS Security Cryptography. bisacsh COMPUTERS / History bisacsh Philology, Modern fast Computers Access control Passwords fast Cryptography fast Data encryption (Computer science) fast Electronic surveillance fast Philology fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029555 http://id.loc.gov/authorities/subjects/sh85034453 http://id.loc.gov/authorities/subjects/sh94001524 http://id.loc.gov/authorities/subjects/sh85100821 http://id.loc.gov/authorities/subjects/sh86006641 http://id.loc.gov/authorities/subjects/sh85100822 |
title | Passwords : philology, security, authentication / |
title_alt | Passwords : philology, security, authentication -- Cryptophilology, I -- Machine translation : a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. |
title_auth | Passwords : philology, security, authentication / |
title_exact_search | Passwords : philology, security, authentication / |
title_full | Passwords : philology, security, authentication / Brian Lennon. |
title_fullStr | Passwords : philology, security, authentication / Brian Lennon. |
title_full_unstemmed | Passwords : philology, security, authentication / Brian Lennon. |
title_short | Passwords : |
title_sort | passwords philology security authentication |
title_sub | philology, security, authentication / |
topic | Computers Access control Passwords. http://id.loc.gov/authorities/subjects/sh85029555 Cryptography. http://id.loc.gov/authorities/subjects/sh85034453 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Philology. http://id.loc.gov/authorities/subjects/sh85100821 Electronic surveillance. http://id.loc.gov/authorities/subjects/sh86006641 Philology, Modern. http://id.loc.gov/authorities/subjects/sh85100822 Ordinateurs Accès Contrôle Mots de passe. Cryptographie. Chiffrement (Informatique) Philologie. Surveillance électronique. philology. aat COMPUTERS Security Cryptography. bisacsh COMPUTERS / History bisacsh Philology, Modern fast Computers Access control Passwords fast Cryptography fast Data encryption (Computer science) fast Electronic surveillance fast Philology fast |
topic_facet | Computers Access control Passwords. Cryptography. Data encryption (Computer science) Philology. Electronic surveillance. Philology, Modern. Ordinateurs Accès Contrôle Mots de passe. Cryptographie. Chiffrement (Informatique) Philologie. Surveillance électronique. philology. COMPUTERS Security Cryptography. COMPUTERS / History Philology, Modern Computers Access control Passwords Cryptography Electronic surveillance Philology |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1743338 |
work_keys_str_mv | AT lennonbrian passwordsphilologysecurityauthentication |