Passwords: Philology,Security,Authentication
Authors: Brian Lennon
ISBN-10: 067498076X
ISBN-13: 9780674980761
Publication Date 出版日期: 2018-02-26
Print Length 页数: 232 pages
Cryptology,the mathematical and technical science of ciphers and codes,and philology,the humanistic study of natural or human languages,are typically understood as separate domains of activity. But Brian Lennon contends that these two domains,both concerned with authentication of text,should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more,these humanistic uses,no less than cryptological ones,are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Lennon’s history encompasses the first documented techniques for the statistical analysis of text,early experiments in mechanized literary analysis,electromechanical and electronic code-breaking and machine translation,early literary data processing,the computational philology of late twentieth-century humanities computing,and early twenty-first-century digital humanities. Throughout,Passwords makes clear the continuity between cryptology and philology,showing how the same practices flourish in literary study and in conditions of war.
Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists,hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary,that preeminent product of the philologist’s scholarly labor,which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing―passwords―that many of us use every day.
Passwords Philology,Security,Authentication
相关推荐
- Continuous Deployment: Enable Faster Feedback, Safer Releases, and More Reliable Software
- Generative AI and Digital Forensics
- Principles of Cybersecurity
- Data Security in Cloud Computing,Volume II
- Data Security in Cloud Computing,Volume I
- CISSP Study Guide: Master Cybersecurity & Advance your IT Career with this Complete Exam Prep for Achieving CISSP Certification