feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Amsterdam : Atlantis Press | Amsterdam : Amsterdam University Press
    UID:
    b3kat_BV045455385
    Format: 223 Seiten , Illustrationen, Faksimiles, Diagramme , 25 cm
    ISBN: 9789462985544
    Uniform Title: Titkosírás a kora újkori Magyarországon
    Note: Erscheint auch als Open Access bei De Gruyter
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-90-4853-669-6 10.5117/9789462985544
    Additional Edition: 10.1515/9789048536696
    Language: English
    Keywords: Ungarn ; Geheimschrift ; Geschichte 1470-1756
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Amsterdam :Amsterdam University Press,
    UID:
    almahu_9948618216902882
    Format: 1 online resource (224 pages)
    ISBN: 90-485-3669-3
    Content: A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
    Note: Frontmatter -- , Table of contents -- , Abbreviations -- , Note on terminology -- , Note on names -- , 1. Introduction -- , 2. Uncovered fields in the research literature -- , 3. Secret writings and attitudes - research questions -- , 4. Theory and practice of cryptography in early modern Europe -- , 5. Ciphers in Hungary: the source material -- , 6. Ciphers in action -- , 7. Ways of knowledge transfer -- , 8. Scenes of secrecy -- , 9. Summary -- , 10. Appendix -- , Acknowledgements -- , Earlier publications -- , Bibliography -- , Index , In English.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Amsterdam :Amsterdam University Press,
    UID:
    almafu_9959051977302883
    Format: 1 online resource
    ISBN: 9789048536696
    Content: A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
    Note: Frontmatter -- , Table of contents -- , Abbreviations -- , Note on terminology -- , Note on names -- , 1. Introduction -- , 2. Uncovered fields in the research literature -- , 3. Secret writings and attitudes – research questions -- , 4. Theory and practice of cryptography in early modern Europe -- , 5. Ciphers in Hungary: the source material -- , 6. Ciphers in action -- , 7. Ways of knowledge transfer -- , 8. Scenes of secrecy -- , 9. Summary -- , 10. Appendix -- , Acknowledgements -- , Earlier publications -- , Bibliography -- , Index , In English.
    Language: English
    URL: Cover
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    University Park, PA :Penn State University Press,
    UID:
    almafu_9959941251702883
    Format: 1 online resource (176 p.) : , 24 illustrations
    ISBN: 9780271090269
    Content: First discovered in a Hungarian library in 1838, the Rohonc Codex keeps privileged company with some of the most famous unsolved writing systems in the world, notably the Voynich manuscript, the Phaistos Disk, and Linear A. Written entirely in cipher, this 400-year-old, 450-page-long, richly illustrated manuscript initially gained considerable attention but was later dismissed as an apparent forgery. No serious scholar would study it again until the turn of the twenty-first century. This engaging narrative follows historian Benedek Láng’s search to uncover the truth about this thoroughly mysterious book that has puzzled dozens of codebreakers. Láng surveys the fascinating theories associated with the Codex and discusses possible interpretations of the manuscript as a biblical commentary, an apocryphal gospel, or a secret book written for and by a sect. He provides an overview of the secret writing systems known in early modern times and an account of the numerous efforts to create an artificial language or to find a long-lost perfect tongue—endeavors that were especially popular at the time the Codex was made. Lastly, he tests several codebreaking methods in order to decipher the Codex, finally pointing to a possible solution to the enigma of its content and language system.Engagingly written, academically grounded, and thoroughly compelling, The Rohonc Code will appeal to historians, scholars, and lay readers interested in mysteries, codes, and ciphers.
    Note: Frontmatter -- , Contents -- , Illustrations -- , Acknowledgments -- , Introduction -- , Chapter 1 The Treasure-Hunting Bookdealer -- , Chapter 2 Codebreaking Attempts -- , Chapter 3 The Quest Begins -- , Chapter 4 The Jesus Code -- , Chapter 5 Writing in Ciphers and Codes -- , Chapter 6 Decryption -- , Chapter 7 Shorthand Systems -- , Chapter 8 Artificial Languages and Codes -- , Chapter 9 Methods of Codebreaking -- , Coda -- , Appendix -- , Notes -- , Bibliography -- , Index , In English.
    Language: English
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Amsterdam University Press
    UID:
    gbv_1778549411
    Format: 1 Online-Ressource
    ISBN: 9789462985544
    Content: A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages
    Note: English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Amsterdam : Amsterdam University Press
    UID:
    gbv_1851397930
    Format: 1 online resource (225 pages)
    Edition: 1st ed.
    ISBN: 9789048536696
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9789462985544
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9789462985544
    Language: English
    Keywords: Electronic books.
    URL: Image
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Amsterdam University Press | Baltimore, Maryland :Project Muse,
    UID:
    almahu_9949711326002882
    Format: 1 online resource (1 EPUB unpaged) : , illustrations, facsimiles
    Uniform Title: Titkosírás a kora újkori Magyarországon.
    Content: A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of private applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
    Note: Translation of: Titkosírás a kora újkori Magyarországon. , Uncovered fields in the research literature -- Secret writings and attitudes - research questions -- theory and practice of cryptography in early modern Europe -- Ciphers in Hungary: the source material -- Ciphers in action -- Ways of knowledge transfer -- Scenes of secrecy. , Undetermined.
    Additional Edition: ISBN 94-6298-554-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    Budapest : Balassi
    UID:
    gbv_828188467
    Format: 335, VII S , Ill
    ISBN: 9789635069514
    Language: Hungarian
    Keywords: Ungarn ; Geheimschrift ; Geschichte 1470-1756
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Amsterdam :Amsterdam University Press,
    UID:
    edocfu_9959051977302883
    Format: 1 online resource
    ISBN: 9789048536696
    Content: A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
    Note: Frontmatter -- , Table of contents -- , Abbreviations -- , Note on terminology -- , Note on names -- , 1. Introduction -- , 2. Uncovered fields in the research literature -- , 3. Secret writings and attitudes – research questions -- , 4. Theory and practice of cryptography in early modern Europe -- , 5. Ciphers in Hungary: the source material -- , 6. Ciphers in action -- , 7. Ways of knowledge transfer -- , 8. Scenes of secrecy -- , 9. Summary -- , 10. Appendix -- , Acknowledgements -- , Earlier publications -- , Bibliography -- , Index , In English.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Amsterdam University Press | Baltimore, Maryland :Project Muse,
    UID:
    edoccha_9958930632902883
    Format: 1 online resource (1 EPUB unpaged) : , illustrations, facsimiles
    Uniform Title: Titkosírás a kora újkori Magyarországon.
    Content: A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of private applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
    Note: Translation of: Titkosírás a kora újkori Magyarországon. , Uncovered fields in the research literature -- Secret writings and attitudes - research questions -- theory and practice of cryptography in early modern Europe -- Ciphers in Hungary: the source material -- Ciphers in action -- Ways of knowledge transfer -- Scenes of secrecy. , Undetermined.
    Additional Edition: ISBN 94-6298-554-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages