The Shakespearean Ciphers Examined


Book Description

The authors address theories, which, through the identification of hidden codes, call the authorship of Shakespeare's plays into question.







The Second Cryptographic Shakespeare


Book Description

0-9630727-0-6herein the poems & plays attributed to William Shakespeare are proven to contain the enciphered name of the concealed author, Francis Bacon.




Contested Will


Book Description

Shakespeare scholar James Shapiro explains when and why so many people began to question whether Shakespeare wrote his plays.




Dee-Coding Shakespeare


Book Description

Revolutionary new discoveries reveal the actual location where (according to coded information embedded in the poet's church) the great Bard himself has left physical evidence that promises to finally end the persistent controversy concerning his identity. What is hidden at Stratford could well be the greatest story Shakespeare ever wrote! Unlike anything you've ever read about him, 'Dee-Coding Shakespeare' is an exquisite cryptographic maze and includes over 20 gorgeous, full-page photographs of Holy Trinity Church, Stratford. The reader is taken on a breath-taking journey of discovery and invited to be part of history by solving the mystery themselves. Forty puzzles take just a couple of minutes each to work out and result in a stunning conclusion that will shake the halls of academia and bring new life to our appreciation of the most enduring literary genius the world has ever known. The Bard will never be the same ... to-morrow, and to-morrow, and to-morrow.




The Real Shakespeare


Book Description

One of the central assumptions of established Shakespeare scholarship has been that the playwright produced flawless work needing no revision--that if a text was inferior in style, it could be assumed that Shakespeare did not write it. Thus Shakespeare had nothing to do with the "bad" quartos; these were instead the work of "memorial reconstruction," in which actors remembered and subsequently wrote down entire texts composed by others. In this controversial book, Eric Sams suggests that there is no evidence to substantiate memorial reconstruction, that Shakespeare very probably revised his plays repeatedly, and that he may therefore be the author of the "bad" quartos and of other works not attributed to him. Drawing on testimony from Shakespeare's contemporaries and on documents concerning his family, Sams presents a vivid biographical picture of the first thirty years of the playwright's life. He establishes that Shakespeare's origins were humble: his parents were illiterate Catholics and the family trade was farming and animal husbandry. During this period Shakespeare acquired some knowledge of legal practice, served as the legal hand in an attorney's office, married, and moved to London to join a theatre company and to establish a career as an actor and playwright. Sams traces the impact of Shakespeare's upbringing in the plays themselves--not only those of the Folio edition but others, including the "bad" quartos. He finds that these texts are filled with figurative language that would have been gleaned from a rural upbringing and legal experience. Using detailed textual analysis, he argues compellingly that during these early "lost" years, Shakespeare was in fact writing first versions of his later great works.




Decrypted Secrets


Book Description

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.







Secret History


Book Description

Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the




The Woman All Spies Fear


Book Description

An inspiring true story, perfect for fans of Hidden Figures, about an American woman who pioneered codebreaking in WWI and WWII but was only recently recognized for her extraordinary contributions. A YALSA EXCELLENCE IN NONFICTION FINALIST • A KIRKUS BEST BOOK OF THE YEAR Elizebeth Smith Friedman had a rare talent for spotting patterns and solving puzzles. These skills led her to become one of the top cryptanalysts in America during both World War I and World War II. She originally came to code breaking through her love for Shakespeare when she was hired by an eccentric millionaire to prove that Shakespeare's plays had secret messages in them. Within a year, she had learned so much about code breaking that she was a star in the making. She went on to play a major role decoding messages during WWI and WWII and also for the Coast Guard's war against smugglers. Elizebeth and her husband, William, became the top code-breaking team in the US, and she did it all at a time when most women weren't welcome in the workforce. Amy Butler Greenfield is an award-winning historian and novelist who aims to shed light on this female pioneer of the STEM community.




Recent Books