Passwords : : Philology, Security, Authentication / / Brian Lennon.

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should b...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
VerfasserIn:
Place / Publishing House:Cambridge, MA : : Harvard University Press, , [2018]
©2018
Year of Publication:2018
Language:English
Online Access:
Physical Description:1 online resource (232 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 04101nam a22005415i 4500
001 9780674985391
003 DE-B1597
005 20210824034702.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 210824t20182018mau fo d z eng d
020 |a 9780674985391 
024 7 |a 10.4159/9780674985391  |2 doi 
035 |a (DE-B1597)501447 
035 |a (OCoLC)1030304482 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a mau  |c US-MA 
050 4 |a QA76.9.A25  |b L485 2018eb 
072 7 |a COM080000  |2 bisacsh 
082 0 4 |a 005.8/24  |2 23 
100 1 |a Lennon, Brian,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Passwords :  |b Philology, Security, Authentication /  |c Brian Lennon. 
264 1 |a Cambridge, MA :   |b Harvard University Press,   |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (232 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Preface --   |t 1. Passwords: Philology, Security, Authentication --   |t 2. Cryptophilology, I --   |t 3. Machine Translation: A Tale of Two Cultures --   |t 4. Cryptophilology, II --   |t 5. The Digital Humanities and National Security --   |t Notes --   |t Acknowledgments --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021) 
650 0 |a Computers  |x Access control  |x Passwords. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Electronic surveillance. 
650 0 |a Philology. 
650 7 |a COMPUTERS / History.  |2 bisacsh 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t Harvard University Press Complete eBook-Package 2018  |z 9783110606621 
856 4 0 |u https://doi.org/10.4159/9780674985391 
856 4 0 |u https://www.degruyter.com/isbn/9780674985391 
856 4 2 |3 Cover  |u https://www.degruyter.com/cover/covers/9780674985391.jpg 
912 |a 978-3-11-060662-1 Harvard University Press Complete eBook-Package 2018  |b 2018 
912 |a GBV-deGruyter-alles