The hut six story: Breaking the Enigma codes (English)
National licence
Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95
- New search for: H, HJ
- New search for: H, HJ
In:
Computers and Security
;
2
, 1
;
82-83
;
1983
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:The hut six story: Breaking the Enigma codes
-
Subtitle:Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95
-
Contributors:H, HJ ( author )
-
Published in:Computers and Security ; 2, 1 ; 82-83
-
Publisher:
-
Publication date:1983-01-01
-
Size:2 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 2, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
EditorialHighland, Harold Joseph et al. | 1983
- 3
-
Three new members of the International Board of Editors| 1983
- 5
-
Effective information system security with password controlsWood, Charles Cresson et al. | 1983
- 11
-
Notes on terrorism and data processingMenkus, Belden et al. | 1983
- 16
-
Computer security: Observations on the state of the technologyMurray, William H. et al. | 1983
- 24
-
Methodology for security analysis of data-processing systemsCaroll, John M. / Wu, Oi-Lun et al. | 1983
- 35
-
Unique approach to security evaluationBackwith, Nigel et al. | 1983
- 41
-
Controlling cryptographic publicationWeingarten, F. et al. | 1983
- 49
-
Towards a new approach to secure database designBussolati, U. / Martella, G. et al. | 1983
- 63
-
Computer crime and its preventionGoldstein, Bruce et al. | 1983
- 67
-
Data communications controlsCerullo, Michael J. et al. | 1983
- 73
-
EFTS impact on computer securityGuynes, Steve et al. | 1983
- 78
-
Securing the distributed word processing networkCallaghan, David R. et al. | 1983
- 82
-
The hut six story: Breaking the Enigma codesH, HJ et al. | 1983
- 83
-
CBEMA privacy and security bibliography (October 1982)H, HJ et al. | 1983
- 83
-
Codes, ciphers and computers: An introduction to information securityH, HJ et al. | 1983
- 84
-
Advances in computer system securityH, HJ et al. | 1983
- 84
-
Tutorial: The security of data in networksH, HJ et al. | 1983
- 85
-
The Office of Technology Assessment reports| 1983
- 88
-
Abstracts of recent articles and literature| 1983
- 97
-
Calendar| 1983
- CO2
-
Editorial Board| 1983