bibliography

Bamford, James. The Puzzle Palace. New York: Penguin, 1983.

Boyer, Carl B. revised by Uta C. Merzbach. A History of Mathematics. Wiley, 1989.

Burham, David. The Rise of the Computer State. New York: Random House, 1983.

Campbell, Jeremy. Grammatical Man: Information, Entropy, Language and Life. New York: Simon & Schuster, 1982.

Card, Orson Scott. Ender’s Game. New York: Tor Books, 1985.

Computer Professionals for Social Responsibility. Cryptography and Privacy Sourcebook, Years 1991–1993.

Dam, Kenneth, and Herbert Lin, eds., National Research Council. Cryptography’s Role in Securing the Information Society. National Academy Press, 1996.

Denning, Dorothy E. Cryptography and Data Security. Reading, MA: Addison-Wesley, 1982.

———. Information Warfare and Security. Reading, MA: Addison-Wesley, 1999.

———, and Peter J. Denning. Internet Besieged, ACM Press, 1998.

Diffie, Whitfield, and Susan Landau. Privacy on the Line. Boston: MIT Press, 1998.

Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. Sebastopol, CA: O’Reilly, 1998.

Electronic Privacy Information Center. Cryptography and Privacy Sourcebook. Years 1994–1998.

Gaines, Helen Fouche. Cryptanalysis. New York: Dover, 1939.

Gardner, Martin. Penrose Tiles to Trapdoor Ciphers. New York: Freeman, 1989.

Garfinkel, Simpson. PGP: Pretty Good Privacy. Sebastopol, CA: O’Reilly, 1995.

Godwin, Mike. Cyber Rights. New York: Times Books, 1998.

Hodges, Andrew. Turing: The Enigma. New York: Simon & Schuster, 1983.

Hoffman, Lance, ed. Building Big Brother. New York: Springer-Verlag, 1995.

Kahn, David. The Codebreakers: The Story of Secret Writing. New York: Macmillan, 1967.

———. Kahn on Codes: Secrets of the New Cryptology. New York: Macmillan, 1983.

Kelly, Kevin. Out of Control. Reading, MA: Addison Wesley, 1994.

Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999.

Levy, Steven. Hackers: Heroes of the Computer Revolution. New York: Doubleday, 1984.

Ludlow, Peter, ed. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Boston: MIT Press, 1996.

Rosenheim, Shawn James. The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Baltimore, MD: Johns Hopkins University Press, 1997.

Schneier, Bruce. Applied Cryptography, second edition. New York: Wiley, 1996.

———, and David Banisar, eds. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance. New York: Wiley Computer Publishing, 1997.

Simmons, Gustavus J., ed. Contemporary Cryptography: The Science of Information Integrity. New York: IEEE Press, 1992.

Singh, Simon. The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography. New York: Doubleday, 1999.

Sterling, Bruce. The Hacker Crackdown. New York: Bantam, 1993.

Wallace, Jonathan D., and Mark Mangan. Sex, Laws, and Cyberspace. New York: Holt, 1996.

Wrixon, Fred B. Codes and Ciphers. Englewood Cliffs, NJ: Prentice-Hall, 1992.

Zim, Herbert T. Codes and Secret Writing. New York: Morrow, 1948.