Catalog Search Results
Author
Language
English
Description
England, 1942. The Nazis' relentless Blitz may have paused, but London's nightly blackouts continue. Now, under the cover of darkness, a madman is brutally killing and mutilating young women in eerie and exact re-creations of Jack the Ripper's crimes. What's more, he's targeting women who are reporting for duty to be Winston Churchill's spies and saboteurs abroad. The officers at MI-5 quickly realize they need the help of special agent Maggie Hope...
Author
Language
English
Description
World War II is raging, and former spy Maggie Hope knows too much. She knows what the British government is willing to do to keep its secrets. She knows the real location of the planned invasion of France. She knows who's lying. She knows who the double-crossers are. She knows exactly who is sending agents to their deaths. These are the reasons Maggie is isolated on a remote Scottish island, in a prison known as Killoch Castle, out of contact with...
Author
Language
English
Formats
Description
"A hands-on guide to introduce kids to the fascinating world of secret codes and ciphers, CODE CRACKING FOR KIDS explores many aspects of cryptology, including famous people who used and invented codes and ciphers, such as Julius Caesar and Thomas Jefferson; codes used during wars, including the Enigma machine, whose cracking helped the Allies gather critical information on German intelligence in World War II; and work currently being done by the...
Author
Language
English
Formats
Description
A computer whiz takes on the government in defense of the right to privacy. On hearing the National Security Agency has secretly installed a program that can read anyone's e-mail, Ensei Tankado comes up with a program to paralyze it. A conflict ensues and people die.
Author
Language
English
Description
Learn how to secure sensitive information with Azure Key Vault.
Do you need to learn how to manage sensitive information for your applications and services? In this course, instructor Nertil Poci shows you how to secure sensitive information with Azure Key Vault. Nertil explains what Azure Key Vault does, then goes over creating Key Vaults, setting up your project dependencies, and securely accessing information stored in Key Vaults. He covers a...
Author
Language
English
Description
Get the detailed info you need to prepare for the Cloud Data Security domain of the CCSP exam. The course is mapped to the objectives used in the August 2022 exam release.
Are you a cybersecurity or cloud computing professional preparing for the Cloud Data Security domain of the CCSP exam? In this course, Mike Chapple presents the detailed information you need, using the objectives that will be reflected in the August 2022 exam release. This course...
7) Speakeasy
Author
Language
English
Description
"In this literate and action-packed historical thriller, set during World War II, a plucky code-breaker fights to keep a deadly secret as her Bonnie-and-Clyde past threatens to catch up with her. Thirty-year-old Lena Stillman is living a perfectly respectable life when a shocking newspaper headline calls up her past: it concerns her former lover, charismatic bank robber Bill Bagley. A romantic and charming figure, Lena had tried to forget him by resuming...
Author
Language
English
Description
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions...