Card | Table | RUSMARC | |
Lennon, Brian. Passwords: philology, security, authentication / Brian Lennon. — 1 online resource (xviii, 207 pages) — <URL:http://elib.fa.ru/ebsco/1743338.pdf>.Record create date: 4/3/2018 Subject: Computers — Access control — Passwords.; Cryptography.; Data encryption (Computer science); Philology.; Electronic surveillance.; Philology, Modern.; Ordinateurs — Accès — Contrôle — Mots de passe.; Cryptographie.; Chiffrement (Informatique); Philologie.; Surveillance électronique.; philology.; COMPUTERS — Security — Cryptography.; COMPUTERS / History; Computers — Access control — Passwords.; Cryptography.; Data encryption (Computer science); Electronic surveillance.; Philology. Collections: EBSCO Allowed Actions: –
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
Group: Anonymous Network: Internet |
Annotation
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
Finuniversity Local Network | All | |||||
Internet | Readers | |||||
Internet | Anonymous |
Table of Contents
- Cover
- Title Page
- Copyright
- Contents
- Preface
- 1. Passwords: Philology, Security, Authentication
- 2. Cryptophilology, I
- 3. Machine Translation: A Tale of Two Cultures
- 4. Cryptophilology, II
- 5. The Digital Humanities and National Security
- Notes
- Acknowledgments
- Index
Usage statistics
Access count: 0
Last 30 days: 0 Detailed usage statistics |