TY - BOOK AU - Lennon,Brian TI - Passwords: philology, security, authentication SN - 9780674985391 AV - QA76.9.A25 L485 2018eb U1 - 005.8/24 23 PY - 2018///] CY - Cambridge, Massachusetts, London, England PB - The Belknap Press of Harvard University Press KW - Computers KW - Access control KW - Passwords KW - Cryptography KW - Data encryption (Computer science) KW - Philology KW - Electronic surveillance KW - Philology, Modern KW - Ordinateurs KW - Accès KW - Contrôle KW - Mots de passe KW - Cryptographie KW - Chiffrement (Informatique) KW - Philologie KW - Surveillance électronique KW - philology KW - aat KW - COMPUTERS KW - Security KW - bisacsh KW - COMPUTERS / History KW - fast KW - Electronic books N1 - Includes bibliographical references and index; Passwords : philology, security, authentication --; Cryptophilology, I --; Machine translation : a tale of two cultures --; Cryptophilology, II --; The digital humanities and national security N2 - Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1743338 ER -