Review by Booklist Review
Gr. 7-12. Based on Singh's excellent adult title The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography (1999), this "Young Readers Edition" doesn't talk down to its audience. In fact, most of the text here appeared in the original book, though some sections, paragraphs, and sentences are omitted and an occasional word is simplified. Trimmed down from the original 402-page volume, this version offers young people a fascinating introduction to the underlying principles, the intriguing history, and the possible future of codes, including the issues and challenges of encrypted Internet communication. Black-and-white illustrations include diagrams and contemporary photographs as well as reproductions of period photos, engravings, documents, and artifacts. A challenging, but fascinating introduction to codes. --Carolyn Phelan
From Booklist, Copyright (c) American Library Association. Used with permission.
Review by Publisher's Weekly Review
Simon Singh breaks down cryptic messages for the teenage set in The Code Book: How to Make It, Break It, Hack It, Crack It, an adaptation of his bestselling adult title The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptology. He covers actual instances of codebreaking, from its role in the plan to execute Mary, Queen of Scots, to the Navajo code talkers of WWII. (Mar.) (c) Copyright PWxyz, LLC. All rights reserved
(c) Copyright PWxyz, LLC. All rights reserved
Review by School Library Journal Review
Gr 7 Up-An in-depth look at the use of secret codes throughout history. Singh utilizes an effective narrative style and intersperses fascinating events and people in this abridged version of his adult book of the same title (Doubleday, 1999). The text, illustrations, charts, and tables are the same. A few chapters have been omitted here, yet the overall flow of the book remains smooth. The difference between steganography and cryptography is discussed, as are the two forms of cryptography: transposition and substitution. A detailed history of secret codes is provided, from Herodotus's earliest accounts of secret messages to Arab cryptographers, Mary Queen of Scots, the German Enigma machine, and the Navajo code talkers. Current work on secret codes and their importance in today's society of Internet commerce are discussed. The last chapter, "The Codebreaker's Challenge," consists of four cryptograms. No solutions are given, but the methods to solve them are discussed. Unfortunately, the glossary from the original title is missing in this version. This book will be a popular addition to any YA collection, especially where secret codes and spy books are popular.-Shauna Yusko, King County Library System, Bellevue, WA (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
(c) Copyright Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
Review by Horn Book Review
(High School) Abridging detail but not depth from his similarly titled adult book, Singh addresses his sophisticated examination of code making and code breaking to teenagers who are intellectually curious and tenacious and well versed in mathematical principles. Beginning with simple substitution ciphers (one letter or number for another), he explains the thinking behind and the creation of multiple substitution ciphers; cipher machines such as WWII's Enigma; asymmetric ciphers, where the key to the cipher can be held privately and used with a public cipher; and the possible future of quantum cryptography. These explanations are clear and straightforward without a jot of superfluous information. Smoothly integrated with these explanations are sections containing biographical sketches of famous cryptographers; the historical importance of decoded messages; codes in literature; and broken as well as unbreakable language codes, such as the one used by the "Navajo code talkers" during WWII. A discussion of privacy issues surrounding contemporary electronic communication concludes the book. With appendices that extend points from the text, further readings suggested for each chapter, and an index.From HORN BOOK, (c) Copyright 2010. The Horn Book, Inc., a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
(c) Copyright The Horn Book, Inc., a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.