Preface to the Revised Edition | |
Preface A Few Words | |
One Day of Magic | |
The Pagent of Cryptology | |
The First 3,000 Years | |
The Rise of the West | |
On the Origin of a Species | |
The Era of the Black Chambers | |
The Contribution of the Dilettantes | |
Crises of the Union | |
The Professor, the Soldier, and the Man on Devil's Island | |
Room 40 | |
A War of Intercepts: I | |
A War of Intercepts: II | |
Two Americans | |
Secrecy for Sale | |
Duel in the Ether: The Axis | |
Duel in the Ether: Neutrals and Allies | |
Censors, Scramblers, and Spies | |
The Scrutable Orientals | |
Russkaya Kriptologiya ("Russian Cryptology") | |
N.S.A.SIDESHOWS | |
The Anatomy of Cryptology | |
Heterogeneous Impulses | |
Rumrunners, Businessmen, and Makers of Non-secret Codes | |
Ciphers in the Past Tense | |
The Pathology of Cryptology | |
Paracryptology | |
Ancestral Voices | |
Messages from Outer Space | |
The New Cryptology | |
Cryptology Goes Public | |
Bibliography | |
Notes to Text | |
Acknowledgments | |
Notes to Illustrations | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.