Technical Articles about the Voynich Manuscript

Technical Articles about the Voynich Manuscript

National Security Agency

29,43 €
IVA incluido
Disponible
Editorial:
W. Frederick Zimmerman
Año de edición:
2020
ISBN:
9781608881741
29,43 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This volume contains four articles written by personnel of the National Security Agency (NSA) about the Voynich manuscript from 1965 to 1978. The first essay, by Brigadier John Tiltman, is entitled 'The Voynich Manuscript: The Most Mysterious Manuscript in the World' and was presented to the Baltimore Bibliophiles in 1967. It provides a basic summary of facts about the manuscript and its provenance and adds a survey of proposed solutions, most of which it dispenses with quite quickly. I found it interesting to discover that Tiltman was first introduced to the Voynich ms. by William Friedman, founder of the NSA, in 1947 (!) I was also intrigued that Tiltman’s scholarly research into the history of medieval herbalism included consultations with leading English academics, no doubt during visits on 'Five Eyes' business.The second essay, originally classifed Top Secret Umbra, is 'An Application of PTAH to the Voynich Manuscript' by Mary D’Imperio - the title itself was unclassified. A few pages in, I came to a full stop when I encountered this: 'PTAH (named for the Egyptian god of wisdom), is a general statistical method developed at IDA (Institute for Defense Analyses), Princeton University. PTAH got its name when a programmer. Mr.Gerry Mitchell, was listening to the opera 'Aida' while working on his program. He was struck by the passage 'immenso Ptah noi invociam,' and named his program after the Egyptian god. The name was ultimately extended from this program, implementing a particular application of the method, to the method and its mathematical theory as well...' The technical meaning of PTAH remains classified, although Google helped me find a journal article that suggests PTAH must be some sort of Hidden Markov Model. (Math. Comput. Appl. 2019, 24, 14; doi:10.3390/mca24010014) D’Imperio used PTAH to analyze the Voynich manuscript and similar works and concluded that 'I find the above comparisions quite convincing support for a view that the Voynich text, regarded as a string of single letters, does not ’act like’ natural language. Instead, it exhibits a clear positional regularity or characters within words. I believe that these findings strengthen the theory of Friedman and Tiltman that an artificial language may underlie the Yoynich text.' Government interest dating back to 1947 ... pharmacology unknown to modern man ... artificial languages ... the movie 'ARRIVAL' based on Ted Chiang’s 'Story of Your Life' ... hmmm ...The third essay, also by D’Imperio, is 'An Application of Cluster Analysis and Multidimensional Scaling to the Question of ’Hands’ and ’Languages’ in the Voynich Manuscript.' She uses cluster analytic techniques to examine findings by Captain Prescott Currier, who suggested that the manuscript’s pages can be clustered into groups of multiple authors and styles. D’Imperio’s discussion includes warnings that are still sound today: ' The interpretation of cluster analysis results is unavoidably circular; we propose a certain structure in the group of objects under study, we perform the computation, and we are happy if we see what we expected, or at least something that makes sense in terms of our original hypothesis, however revised.'The fourth and final essay, by James Child, takes an important step forward by proposing that 'the Voynich Manuscript does not contain an artificial language nor the enciphered text of an underlying text in an unknown language. but is a text in a hitherto unknown medieval North Germanic dialect.'People who enjoy works like THE DA VINCI CODE, PUZZLE PALACE, and Snowden will find this fascinating.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
    Disponible

    258,62 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    73,25 €

  • A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem
    V S Saranya
    IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet con...
  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Blockchain Beyond Bitcoin
    Edward Franklin
    Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations powered by blockchain, such as smart contracts, decentralized applications, digital identity, supply chain, voting, and more. Learn how blockchain works, why it matters, and how to use it for various purposes and industries. ...

Otros libros del autor

  • Operation REGAL
    National Security Agency
    In a world consumed by information warfare, where the line between truth and deception becomes increasingly blurred, understanding the intricacies of espionage is paramount.The Berlin Tunnel operation, a daring feat of engineering and intelligence gathering that was doomed by forces beyond its control, offers a potent reminder of the lengths nations will go to for strategic adv...
    Disponible

    15,31 €

  • The National Security Agency and The EC-121 Shootdown
    National Security Agency
    In a world of escalating tensions and unpredictable adversaries, understanding the intricate workings of intelligence gathering and the delicate balance between risk and reward is more crucial than ever. This book, delving into the heart of a Cold War crisis and its impact on the National Security Agency, reveals the challenges and triumphs of those tasked with safeguarding nat...
    Disponible

    25,64 €

  • New Research on the Voynich Manuscript
    National Security Agency
    The Voynich manuscript is famous among enthusiasts of arcana, rare books, and cryptography. It is a 200+ page color rare book written in a cipher that has resisted decryption to this day. It is named after a Polish rare book dealer who surfaced the manuscript in 1912. Its history and provenance are uncertain. Many people have been proposed as possible authors, among them Roger ...
    Disponible

    26,52 €