[introducing Gideon Crew]Book - 2011
At twelve, Gideon Crew witnessed his father, a world-class mathematician, accused of treason and gunned down.
At twenty-four, summoned to his dying mother's bedside, Gideon learned the truth: His father was framed and deliberately slaughtered. With her last breath, she begged her son to avenge him.
Now, with a new purpose in his life, Gideon crafts a one-time mission of vengeance, aimed at the perpetrator of his father's destruction. His plan is meticulous, spectacular, and successful.
But from the shadows, someone is watching. A very powerful someone, who is impressed by Gideon's special skills. Someone who has need of just such a renegade.
For Gideon, this operation may be only the beginning . . .
From the critics
QuotesAdd a Quote
“It was a good disguise. That theatrical stuff you’re wearing fooled me for a while. You are one ugly mother.”
“Forget the mythology. If you truly had the power to transmute, you’d be a fool to make gold. In today’s world, there are far more valuable elements out there. For instance…” Minsky again stabs the periodic table with his paperclip. Atomic symbol Np.
“That’s not nitrogen, is it?” I ask. “Neptunium.” “Neptunium?” “Named after the planet Neptune,” Minsky explains, forever the teacher. “What is it?” I ask, cutting him off. “Ah, but you’re missing the point,” Minsky says. “The concern isn’t what is it? The concern is what it could be…” With one final jab, Minsky moves his paperclip to the nearest element on the right.
“Pu?” “Plutonium,” Minsky says, his laugh long gone. “In today’s world, it’s arguably the most valuable element on the chart.” He looks up at us to make sure we get it. “Say hello to the new Midas touch.”
How much has encryption changed in the few years since the book:
you. There’s only one outgoing port in the entire network, and all that it allows past is passphrase-encrypted packets from specific nodes, all of which are secure. And even then the packets can only go to certain external IPs.
A Critique of the Thresher Discrete Logarithm Encryption Standard EVP-4: A Theoretical Back-Door Cryptanalysis Attack Strategy Using a Group of φ-Torsion Points of an Elliptic Curve in Characteristic φ.
Age SuitabilityAdd Age Suitability
There are no age suitabilities for this title yet.
SummaryAdd a Summary
There are no summaries for this title yet.
There are no notices for this title yet.