To a cunning serial killer, she was the one that got away. Until now... FBI Special Agent Nina Guerrera escaped a serial killer's trap at sixteen. Years later, when she's jumped in a Virginia park, a video of the attack goes viral. Legions of new fans are not the only ones impressed with her fighting skills. The man who abducted her eleven years ago is watching. Determined to reclaim his lost prize, he commits a grisly murder designed to pull her into the investigation...but his games are just beginning. And he's using the internet to invite the public to play along. His coded riddles may have made him a depraved social media superstar--an enigmatic cyber-ghost dubbed "the Cipher"--but to Nina he's a monster who preys on the vulnerable. Partnered with the FBI's preeminent mind hunter, Dr. Jeffrey Wade, who is haunted by his own past, Nina tracks the predator across the country. Clue by clue, victim by victim, Nina races to stop a deadly killer while the world watches.
Kathe Koja's classic, award-winning horror novel is finally available as an ebook. Nicholas, a would-be poet, and Nakota, his feral lover, discover a strange hole in the storage room floor down the hall - "Black. Pure black and the sense of pulsation, especially when you look at it too closely, the sense of something not living but alive." It begins with curiosity, a joke - the Funhole down the hall. But then the experiments begin. "Wouldn't it be wild to go down there?" says Nakota. Nicholas says "We're not." But they're not in control, not from the first moment, as those experiments lead to obsession, violence, and a very final transformation for everyone who gets too close to the Funhole. THE CIPHER was the winner of the 1991 Bram Stoker Award, and was recently named one of io9.com's Top 10 Debut Science Fiction Novels That Took the World By Storm. Long out-of-print and much sought-after, it is finally available as an ebook, with a new foreword by the author. "An ethereal rollercoaster ride from start to finish." - The Detroit Free Press "Combines intensely poetic language and lavish grotesqueries." - BoingBoing "Kathe Koja is a poet ... [T]he kind that prefers to read in seedy bars instead of universities, but a poet." - The New York Review of Science Fiction "Her 20-something characters are poverty-gagged 'artists' who exist in that demimonde of shitty jobs, squalid art galleries, and thrift stores; her settings are run-down studios, flat-beer bars, and dingy urban streets [a] long way from Castle Rock, Dunwich, or Stepford, that's for sure." - Too Much Horror Fiction "This powerful first novel is as thought-provoking as it is horrifying." - Publishers Weekly "Unforgettable ... [THE CIPHER] takes you into the lives of the dark dreamers that crawl on the underbelly of art and culture. Seldom has language been so visceral and so right." - Locus "[THE CIPHER] is a book that makes you sit up, pay attention, and jettison your moldy preconceptions about the genre ... Utterly original ... [An} imaginative debut." - Fangoria "Not so much about the vast and wonderful strangeness of the universe as it is about the horrific and glorious potential of the human spirit." - Short Form
Lucy Trenton, a member of the royal Rampling family, manages to keep her ability to detect majick and those who use it hidden from her family and suitor until she carelessly uses it to locate a magickal cipher.
The Cipher of Genesis unlocks the key to the lost traditions of the Book of Genesis, offering profound implications for faiths rooted in the Hebrew Testament -- Christianity, Judaism, and Islam. Jesus knew this secret wisdom and attempted to teach it, but that message remained with only a few. For the most part, the first book of the Bible has been dismissed as simplistic and archaic, a literal retelling of the creation of the world in seven days, the story of Adam and Eve, and generational listings. Suares's essential argument is that the words in Genesis cannot simply be translated; one must understand the code, or the true meaning behind the words remains hidden. Each letter of the Hebrew alphabet represents a specific number, which signifies the living archetypal forces moving within the universe. Reading Genesis with knowledge of the code can project these forces into our very being and bring about the experience of Revelation. Among Suares's key points are the evident ramifications of the hidden teachings on parts of the New Testament. It is from this perspective that he interprets the Gospels of Matthew and John in a new and thought-provoking way. Suares unlocks the secrets of the Bible to reveal the ultimate aim of higher consciousness through the coded process of Revelation.
Robert "Smiles" Smylie and his friend Ben become embroiled in a high-stakes negotiation with a pair of suspicious Feds when Ben cracks a code with the power to unlock all the Internet's secrets.
Molly Brodak’s The Cipher is a deft and unsparing study of the limits of knowledge and belief, and of what solace can be found within those limits. “We stand on the rim of the void,” Brodak writes. “We hold our little lamps of knowing / on the rim, and look in.” Drawing vividly from mathematics, Christianity, European history, urban life, and the natural world, these poems reveal a vision of contemporary experience that is at once luminous and centered on an unshakable emptiness. Wise, sharp, and sometimes devastating, The Cipher leads us through a world in which little can be trusted, takes its measure, and does not look away.
I thought you were dead...' In the peaceful village of Old Sawrey, in the idyllic Lake District, Warren Howe is brutally slaughtered with his own scythe by a mysterious hooded figure. The police have several suspects, but there is insufficient evidence to make an arrest. Years later an anonymous tip-off sparks the interest of DCI Hannah Scarlett, who heads the local Cold Case Review Team. With the help of historian Daniel Kind, Hannah digs deeper in the quest for truth and discovers that, in Old Sawrey, old sins cast long shadows. Following the killer's trail, Hannah arrives at a shocking conclusion, one that will change lives forever.
The philosophical study of technology has acquired only recently a voice in academic conversation. This situation is due, in part, to the fact that technology obviously impacts on "the real world," whereas the favored stereotype of philosophy allegedly does not. Furthermore, in some circles it was assumed that philosophy ought not impinge on the world. This bias continues today in the form of a general dismissal of the growing area now referred to as "applied philosophy". By contrast, the academic scrutiny of science has for the most part been accepted as legitimate for some 30 years, primarily because it has been conducted in a somewhat ethereal manner. This is, in part, because it was believed that, science being pure, one could think (even philosophically) about science without jeopardizing one's intellectual purity. Since World War II, however, practitioners of the metascientific arts have come to ac knowledge that science also shows signs of having touched down on numerous occasions in what can only be identified as the real world. No longer able to keep this banal truth a secret, purists have sought to defuse its import by stressing the difference between pure and applied science; and, lest science be tainted by contact with the world through its applications, they have devoted additional energy to separating applied science somehow from technology.
Contains over one hundred puzzles and problems to solve, ranging in difficulty from relatively simple to complex, and includes an answer key.
Beginning Cryptography with Java While cryptography can still be a controversial topic in theprogramming community, Java has weathered that storm and provides arich set of APIs that allow you, the developer, to effectivelyinclude cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover thearchitecture of the JCE and JCA, symmetric and asymmetric keyencryption in Java, message authentication codes, and how to createJava implementations with the API provided by the Bouncy CastleASN.1 packages, all with plenty of examples. Building on thatfoundation, the second half of the book takes you into higher-leveltopics, enabling you to create and implement secure Javaapplications and make use of standard protocols such as CMS, SSL,and S/MIME. What you will learn from this book How to understand and use JCE, JCA, and the JSSE for encryptionand authentication The ways in which padding mechanisms work in ciphers and how tospot and fix typical errors An understanding of how authentication mechanisms areimplemented in Java and why they are used Methods for describing cryptographic objects with ASN.1 How to create certificate revocation lists and use the OnlineCertificate Status Protocol (OCSP) Real-world Web solutions using Bouncy Castle APIs Who this book is for This book is for Java developers who want to use cryptography intheir applications or to understand how cryptography is being usedin Java applications. Knowledge of the Java language is necessary,but you need not be familiar with any of the APIs discussed. Wrox Beginning guides are crafted to make learningprogramming languages and technologies easier than you think,providing a structured, tutorial format that will guide you throughall the techniques involved.
Thequestion“Streamciphers:deadoralive?”wasposedbyAdiShamir.Intended to provokedebate,the questioncouldnot havebeen better, ormorestarkly,put. However,itwasnotShamir'sintentiontosuggestthatstreamciphersthemselves were obsolete; rather he was questioning whether stream ciphers of a dedicated designwererelevantnowthattheAESispervasivelydeployedandcanbeusedas a perfectly acceptablestreamcipher. To explore this question the eSTREAM Project was launched in 2004, part of the EU-sponsored ECRYPT Framework VI Network of Excellence. The goal of the project was to encourage academia and industry to consider the “dead stream cipher” and to explore what could be achieved with a dedicated design. Now, after several years of hard work, the project has come to a close and the 16 ciphers in the ?nal phase of eSTREAM are the subject of this book. The designers of all the ?nalist ciphers are to be congratulated. Regardless of whether a particular algorithm appears in the ?nal portfolio, in reaching the third phase of eSTREAM all the algorithms constitute a signi?cant milestone in the development of stream ciphers. However, in addition to thanking all designers, implementers, and crypt- alysts who participated in eSTREAM, this is a ?tting place to o?er thanks to some speci?c individuals.
This book describes and analyses many cipher systems ranging from the earliest and most elementary to the most recent and sophisticated(RSA and DES).