000 | 03643cam a2200421Ii 4500 | ||
---|---|---|---|
001 | ocn887817555 | ||
003 | OCoLC | ||
005 | 20240726104718.0 | ||
008 | 140819t20142014sz ob 001 0 eng d | ||
040 |
_aNT _beng _erda _epn _cNT _dGW5XE _dYDXCP _dCOO _dUPM _dE7B _dOCLCF _dEBLCP _dDEBSZ _dOCLCQ _dOCL _dSTF _dIOG _dZ5A _dOCLCA _dESU _dOCLCQ _dVT2 _dOCLCO _dREB _dCEF _dDEHBZ _dOCLCQ _dOCLCO _dINT _dU3W _dOCLCQ _dOCLCO _dWYU _dYOU _dTKN _dOCLCQ _dOCLCO _dOL |
||
020 |
_a9783319082783 _q((electronic)l(electronic)ctronic) |
||
020 |
_a3319082787 _q((electronic)l(electronic)ctronic) |
||
020 | _a3319082795 | ||
020 | _a3319359827 | ||
043 |
_ap------ _an-us--- |
||
050 | 0 | 4 |
_aD810 _b.C634 2014 |
049 | _aMAIN | ||
100 | 1 |
_aDonovan, Peter, _e1 |
|
245 | 1 | 0 | _aCode breaking in the Pacific /Peter Donovan, John Mack. |
260 |
_aCham : _bSpringer, _c(c)2014. |
||
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
504 | _a2 | ||
505 | 0 | 0 |
_aCommunications and Sigint -- _tJapanese Expansion 1895-1941 -- _tThe GCCS 1919-1941 -- _tWilliam Friedman and the US Army -- _tEarly American Naval Sigint -- _tDevelopments in Australia -- _tPreparedness for Attack?- Major Technical Encryption Systems -- _tJN-25 and its Cryptanalysis -- _tUsing Common Book Groups -- _tRecovery of a Code Book -- _tBreaking Additive Systems -- _tMaking Additive Systems Secure -- _tRedundant Encryption -- _tThe Scanning Distribution -- _tCiphers and the Submarines -- _tCentral Bureau 1942-1945 -- _tOrganisation and Reorganisation -- _tSecurity, Censorship and Leaks -- _tConclusion -- _tFrom Pearl Harbor to Midway -- _tGuadalcanal and Papua -- _tRabaul and the Philippines. |
520 | 0 | _aThis book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource. | |
530 |
_a2 _ub |
||
650 | 0 |
_aWorld War, 1939-1945 _zPacific Ocean _xCryptography. |
|
650 | 0 |
_aCryptography _zUnited States _xHistory _y20th century. |
|
655 | 1 | _aElectronic Books. | |
700 | 1 |
_aMack, John, _e1 |
|
856 | 4 | 0 |
_zClick to access digital title | log in using your CIU ID number and my.ciu.edu password. _uhttpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=830735&site=eds-live&custid=s3260518 |
942 |
_cOB _D _eEB _hD. _m2014 _QOL _R _x _8NFIC _2LOC |
||
994 |
_a92 _bNT |
||
999 |
_c75746 _d75746 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |