Browse all books

Books in Making and Breaking Codes series

  • Making Secret Codes

    Jillian Gregory

    Library Binding (Capstone Press, July 1, 2010)
    Throughout history, army generals, spies, and even scientists have guarded information through secret codes. Find out how they did it and learn how to create your own secret codes. You and your friends can share secrets that will leave everyone else scratching their heads.
    Y
  • Breaking Secret Codes

    Jillian Gregory

    Library Binding (Capstone Press, July 1, 2010)
    Coded information may look confusing, but most codes provide hints that can help you break them. Learn how to find and interpret code patterns and repetitions. With your new super-sleuthing skills, you’ll be cracking codes in no time!
    Y
  • Speaking Secret Codes

    Sheri Ann Bell-Rehwoldt

    Library Binding (Capstone Press, July 1, 2010)
    From hospital and police codes to Cockney slang, spoken codes can be both helpful and entertaining. Learn the history behind some of today’s most useful and popular codes, and then have fun creating a language all your own.
    Q
  • The History of Cryptography

    Susan Meyer

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Shares the history of cryptography and explains how some of the greatest minds discovered how to make and break codes.
  • White and Black Hat Hackers

    Jason Porterfield

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Hackers are those individuals who gain access to computers or networks without official permission. In this intriguing resource, readers learn the differences among white hat, black hat, and gray hat hackers and their ways of working concerning computer networks today. The origins and history of hacker culture are examined, as are the law enforcement methods of catching criminals. Some of the topics covered are the motives for hacking, black hat targets, online hazards, malware programs, and typical hacker techniques. Government-sponsored hacking in cyber warfare efforts, hactivism, and famous hackers are also reviewed.
  • Uncracked Codes and Ciphers

    Ann Byers

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Examines eight codes and ciphers that could not be solved, including the Phaistos Disc, the Voynich Manuscript, and the Dorabella Cipher.
  • Digital Era Encryption and Decryption

    Ryan Nagelhout

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Todays news headlines are plentifully peppered by the latest hacks into some of the worlds largest and most reputable companies. These malicious intrusions leave the personal, banking, and credit card information of millions of people vulnerable to the malevolent whims of the hackers. Meanwhile, inside the world of cryptography, the race is on to keep that information as safe and protected as possible as hackers uncover new ways to access it. Readers will be riveted by this race, the outcome of which affects us all.
  • Ciphers, Codes, Algorithms, and Keys

    Laura La Bella

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Provides an overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep people's information safe and secure.
  • Cyber Attacks, Counterattacks, and Espionage

    Daniel E. Harmon

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    With constant headlines announcing the latest infiltration by hackers, it is more important than ever to be well informed on the topic. In this timely book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime. Readers will be as informed as they are captivated by cryptographyÂ’s internet-age version of a criminal and crime-fighting story.
  • Famous Cryptographers

    Jeri Freedman

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Provides information on some of the people who shaped cryptography, including Anson Stager, Elizabeth Friedman, and Alan Turing.
  • Cryptography: Code Making and Code Breaking

    Rosen Publishing Group

    Library Binding (Rosen Young Adult, Jan. 1, 2017)
    Data encryption and security is an increasingly relevant subject in our digitized world. Cryptography is used to make e-commerce and online communication secure, protecting banking information, sensitive documents, and more. When you purchase something online or send a confidential e-mail, protocols created by cryptographers protect that information. However, if your private information is hacked electronically, cryptographers are also to blame. This series sheds light on the history of cryptography, the “arms race” between those protecting sensitive information and those trying to access it, the lives of famous cryptographers, and the tools and methods that cryptographers use.