It looks like you're offline.
Open Library logo
additional options menu
Last edited by RenameBot
August 31, 2008 | History

Wayne G. Barker

21 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: History of Codes and Ciphers in the U.S. During the Period Between World Wars: 1919-1929 (Cryptographic Series , No 22, Part 1)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: The anatomy of two traitors: the defection of Bernon F. Mitchell and William H. Martin

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the simple substitution cipher with word divisions using non-pattern word lists

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of an Enciphered Code Problem: Where an Additive Method of Encipherement Has Been Used

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Hagelin cryptograph

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptograms in Spanish (M-9)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: History of Codes and Ciphers in the United States During the Period Between the World Wars: 1930-1939 (Cryptographic Series , No 54, Part 2)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: The history of codes and ciphers in the United States prior to World War I

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of Shift Register Generated Stream Cipher Systems (Cryptographic Series , No 39)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Double Transposition Cipher: Includes Problems and Computer Programs (Cryptographic Series , No 69)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Hagelin Cryptograph (Cryptographic Series , No 17)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Shift Register Generated Stream Cipher Systems (C-39)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Simple Substitution Cipher With Word Divisions (Cryptographic Series , No 2)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptanalysis of the Simple Substitution Cipher With Word Divisions Using Non-Pattern Word Lists (Cryptographic Series , No 2)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptograms
    First published in 1998 1 edition in 1 language

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptograms, 110 Problems to be Solved (M-3)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: The History of Codes and Ciphers in the United States Prior to World War I (Cryptographic Series , No 20)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Introduction to the analysis of the data encryption standard (DES)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Medical Schools of the World Where Instruction Is Given in English

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
August 31, 2008 Edited by RenameBot fix author name
April 1, 2008 Created by an anonymous user initial import