Passwords : : Philology, Security, Authentication / / Brian Lennon.

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should b...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
VerfasserIn:
Place / Publishing House:Cambridge, MA : : Harvard University Press, , [2018]
©2018
Year of Publication:2018
Language:English
Online Access:
Physical Description:1 online resource (232 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780674985391
ctrlnum (DE-B1597)501447
(OCoLC)1030304482
collection bib_alma
record_format marc
spelling Lennon, Brian, author. aut http://id.loc.gov/vocabulary/relators/aut
Passwords : Philology, Security, Authentication / Brian Lennon.
Cambridge, MA : Harvard University Press, [2018]
©2018
1 online resource (232 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface -- 1. Passwords: Philology, Security, Authentication -- 2. Cryptophilology, I -- 3. Machine Translation: A Tale of Two Cultures -- 4. Cryptophilology, II -- 5. The Digital Humanities and National Security -- Notes -- Acknowledgments -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)
Computers Access control Passwords.
Cryptography.
Data encryption (Computer science).
Electronic surveillance.
Philology.
COMPUTERS / History. bisacsh
Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018 9783110606621
https://doi.org/10.4159/9780674985391
https://www.degruyter.com/isbn/9780674985391
Cover https://www.degruyter.com/cover/covers/9780674985391.jpg
language English
format eBook
author Lennon, Brian,
Lennon, Brian,
spellingShingle Lennon, Brian,
Lennon, Brian,
Passwords : Philology, Security, Authentication /
Frontmatter --
Contents --
Preface --
1. Passwords: Philology, Security, Authentication --
2. Cryptophilology, I --
3. Machine Translation: A Tale of Two Cultures --
4. Cryptophilology, II --
5. The Digital Humanities and National Security --
Notes --
Acknowledgments --
Index
author_facet Lennon, Brian,
Lennon, Brian,
author_variant b l bl
b l bl
author_role VerfasserIn
VerfasserIn
author_sort Lennon, Brian,
title Passwords : Philology, Security, Authentication /
title_sub Philology, Security, Authentication /
title_full Passwords : Philology, Security, Authentication / Brian Lennon.
title_fullStr Passwords : Philology, Security, Authentication / Brian Lennon.
title_full_unstemmed Passwords : Philology, Security, Authentication / Brian Lennon.
title_auth Passwords : Philology, Security, Authentication /
title_alt Frontmatter --
Contents --
Preface --
1. Passwords: Philology, Security, Authentication --
2. Cryptophilology, I --
3. Machine Translation: A Tale of Two Cultures --
4. Cryptophilology, II --
5. The Digital Humanities and National Security --
Notes --
Acknowledgments --
Index
title_new Passwords :
title_sort passwords : philology, security, authentication /
publisher Harvard University Press,
publishDate 2018
physical 1 online resource (232 p.)
contents Frontmatter --
Contents --
Preface --
1. Passwords: Philology, Security, Authentication --
2. Cryptophilology, I --
3. Machine Translation: A Tale of Two Cultures --
4. Cryptophilology, II --
5. The Digital Humanities and National Security --
Notes --
Acknowledgments --
Index
isbn 9780674985391
9783110606621
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 L485 42018EB
url https://doi.org/10.4159/9780674985391
https://www.degruyter.com/isbn/9780674985391
https://www.degruyter.com/cover/covers/9780674985391.jpg
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8/24
dewey-sort 15.8 224
dewey-raw 005.8/24
dewey-search 005.8/24
doi_str_mv 10.4159/9780674985391
oclc_num 1030304482
work_keys_str_mv AT lennonbrian passwordsphilologysecurityauthentication
status_str n
ids_txt_mv (DE-B1597)501447
(OCoLC)1030304482
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
is_hierarchy_title Passwords : Philology, Security, Authentication /
container_title Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2018
_version_ 1806143255201447936
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04101nam a22005415i 4500</leader><controlfield tag="001">9780674985391</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210824034702.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210824t20182018mau fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674985391</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/9780674985391</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)501447</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1030304482</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">L485 2018eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM080000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lennon, Brian, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Passwords :</subfield><subfield code="b">Philology, Security, Authentication /</subfield><subfield code="c">Brian Lennon.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (232 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">1. Passwords: Philology, Security, Authentication -- </subfield><subfield code="t">2. Cryptophilology, I -- </subfield><subfield code="t">3. Machine Translation: A Tale of Two Cultures -- </subfield><subfield code="t">4. Cryptophilology, II -- </subfield><subfield code="t">5. The Digital Humanities and National Security -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence. Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war. Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Passwords.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic surveillance.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Philology.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / History.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Harvard University Press Complete eBook-Package 2018</subfield><subfield code="z">9783110606621</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/9780674985391</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674985391</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9780674985391.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060662-1 Harvard University Press Complete eBook-Package 2018</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection>