Download Free The Dakota Cipher Book in PDF and EPUB Free Download. You can read online The Dakota Cipher and write the review.

Ethan Gage, the hero of "Napoleon's Pyramids" and "The Rosetta Key," is back in a rollicking new tale that takes him deep into colonial America's wilderness in search of adventure and treasure.
An American ex-pat is on a mission for Napoleon in the Dakotas while searching for an ancient Norse relic in this historical thriller. Ethan Gage wants to enjoy the fruits of victory after helping Napoleon win the Battle of Marengo, but an ill-advised tryst with Bonaparte’s married sister has made that impossible. So now, with President Thomas Jefferson’s blessings, Ethan and a mystic Norwegian, Magnus Bloodhammer, embark upon an expedition into America’s western wilderness—dodging hostile Indians and a British seductress as they search for the mythical hammer of the Norse god Thor. The prize, which was allegedly carried to North America more than a century before Columbus arrived, leads them across a landscape no white man has yet traversed. Here Gage’s skills will be tested as never before—as he braves frontier peril en route to the most incredible discovery of all time. Praise for The Dakota Cipher “Fast, fun and full of surprises, Dietrich’s rollicking third Ethan Gage escapade (after The Rosetta Key) . . . The tale twists and turns like a spitted serpent, but Dietrich shows his sure hand as a storyteller, leavening a tale rich in intrigue and impressive historic detail with abundant wit and humor.” —Publishers Weekly, starred review “If there weren’t already an Indiana Jones, Dietrich’s Ethan Gage could certainly fit the bill. . . . Dietrich does an excellent job of creating the historical settings of the novels, and the real-life characters Ethan meets along the way . . . feel just right—not historically accurate but labored creations but real people. A spirited installment of what promises to be a long-running series.” —Booklist
What mystical secrets lie beneath the Great Pyramids? Traveling with Napoleon's ambitious expedition, American adventurer Ethan Gage solves a five-thousand-year-old riddle with the help of a mysterious medallion. William Dietrich's books have been hailed for their vivid imagery, evocative atmospheres, impeccable historical accuracy, and ambitious plots. Now, in the breakout novel of his career, he delivers an enthralling story of intrigue, greed, and danger. Ethan Gage, assistant to Ben Franklin and expatriate American in post-revolutionary France, wins an ancient—and possibly cursed—medallion in a card game one night. It turns out that the medallion, covered in seemingly indecipherable symbols, may be linked to a Masonic mystery. That same night, however, Ethan is framed for a prostitute's murder and barely escapes France with his life. Faced with either prison or death, Gage is offered a third choice: to accompany the new emperor, Napoleon Bonaparte, as France sails to conquer Egypt—with Lord Nelson's fleet following close behind. Once Gage arrives, he encounters incredible surprises: one in the form of a beautiful Macedonian slave and another in the dawning knowledge that the medallion may solve one of the greatest riddles of history—who built the Great Pyramids, and why. What is revealed to Gage is more shocking than anyone could ever have imagined. Moving from the lascivious salons of post-revolutionary Paris to the Mediterranean's high seas to the treacherous sands of Egypt, Napoleon's Pyramids is a riveting, action-packed thriller that will captivate readers and introduce them to this supremely talented author.
Before the multi-million, runaway bestseller The Da Vinci Code, Dan Brown set his razor-sharp research and storytelling skills on the most powerful intelligence organization on earth--the National Security Agency (NSA)--in this thrilling novel, Digital Fortress. When the NSA's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant and beautiful mathematician. What she uncovers sends shock waves through the corridors of power. The NSA is being held hostage...not by guns or bombs, but by a code so ingeniously complex that if released it would cripple U.S. intelligence. Caught in an accelerating tempest of secrecy and lies, Susan Fletcher battles to save the agency she believes in. Betrayed on all sides, she finds herself fighting not only for her country but for her life, and in the end, for the life of the man she loves. From the underground hallways of power to the skyscrapers of Tokyo to the towering cathedrals of Spain, a desperate race unfolds. It is a battle for survival--a crucial bid to destroy a creation of inconceivable genius...an impregnable code-writing formula that threatens to obliterate the post-cold war balance of power. Forever.
A fusion of Steven Pressfield's Gates of Fire and the movie Braveheart; a novel of ancient warfare, lethal politics, and the final great clash of Roman and Celtic culture. For three centuries, the stone barrier we know as Hadrian's Wall shielded Roman Britain from the unconquered barbarians of the island's northern highlands. But when Valeria, a senator's daughter, is sent to the Wall for an arranged marriage to an aristocratic officer in 367 AD, her journey unleashes jealousy, passion and epic war. Valeria's new husband, Marcus, has supplanted the brutally efficient veteran soldier Galba as commander of the famed Petriana cavalry. Yet Galba insists on escorting the bride–to–be on her journey to the Wall. Is he submitting to duty? Or plotting revenge? And what is the mysterious past of the handsome barbarian chieftain Arden Caratacus, who springs from ambush and who seems to know so much of hated Rome? As sharp as the edge of a spatha sword and as piercing as a Celtic arrow, Hadrian's Wall evokes a lost world of Roman ideals and barbaric romanticism.
Decoded is a book like no other: a collection of lyrics and their meanings that together tell the story of a culture, an art form, a moment in history, and one of the most provocative and successful artists of our time. Praise for Decoded “Compelling . . . provocative, evocative . . . Part autobiography, part lavishly illustrated commentary on the author’s own work, Decoded gives the reader a harrowing portrait of the rough worlds Jay-Z navigated in his youth, while at the same time deconstructing his lyrics.”—Michiko Kakutani, The New York Times “One of a handful of books that just about any hip hop fan should own.”—The New Yorker “Elegantly designed, incisively written . . . an impressive leap by a man who has never been known for small steps.”—Los Angeles Times “A riveting exploration of Jay-Z’s journey . . . So thoroughly engrossing, it reads like a good piece of cultural journalism.”—The Boston Globe “Shawn Carter’s most honest airing of the experiences he drew on to create the mythic figure of Jay-Z . . . The scenes he recounts along the way are fascinating.”—Entertainment Weekly “Hip-hop’s renaissance man drops a classic. . . . Heartfelt, passionate and slick.”—Kirkus Reviews (starred review)
Napoleon dispatches Gage and his three "savant" friends to chase down the rumor of the fabled mirror of Archimedes. Things turn sticky when Gage's old arch nemesis, the Egyptian Rite, a ruthless cabal out to rule the world, joins the race to grab the mirror for their own evil designs.
“WilliamDietrich...should be read by anyone who loves adventure at its grandest!”—James Rollins, author of Alter of Eden Atthe height of WWII, a quartet of daring American adventurers pits theircunning against a cadre of Nazi S.S. agents seeking to acquire a powerfulweapon for the Fuhrer’s arsenal; today, as the Nazi specter begins to rear itshead once again, the descendants of those long-ago adventurers must unlock thesecrets of their forebears’ mission in order to save the world from Hitler’sresurgent Reich. Now, modern science and ancient Tibetan mythology surround adaring zoologist and a beautiful aviatrix who are all that stand between theNazis and world domination in New YorkTimes bestselling author William Dietrich’s Blood of the Reich, a knockout stand-alone novel perfect for fansof Ken Follett, Frederick Forsyth, and Thor Brad.
Last seen in Napoleon's Pyramids, fleeing the forces of evil in a runaway hot-air balloon over Egypt, Ethan Gage undergoes further life-threatening adventures in this rollicking sequel. Nine months before the balloon incident, Gage arrived in the Holy Land with his benefactor, Napoleon Bonaparte. After various misunderstandings involving the secrets of the Great Pyramid, Bonaparte became his implacable enemy. Now, accused of treason by Napoleon's minions, Pierre Najac and Najac's boss, the French-Italian count and sorcerer Alessandro Silano, Gage flees to Jerusalem, where he searches for his former lover, Astiza, who he fears has fallen into Silano's hands. Gage is also hunting clues that may lead him to the fabled Book of Toth, an ancient tome that promises to reveal the secrets of the universe. Ever the incorrigible gambler and all-around scamp, Gage makes an irresistible anti-hero.
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before. About the technology From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology! About the book Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging. What's inside Construct 30 unbreakable ciphers Measure the strength of your ciphers and guarantee their security Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers of the future About the reader For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required. About the author Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science. Table of Contents 1 Introduction 2 What is cryptography? 3 Preliminary concepts 4 Cryptographer’s toolbox 5 Substitution ciphers 6 Countermeasures 7 Transposition 8 Jefferson Wheel Cypher 9 Fractionation 10 Variable-length fractionation 11 Block ciphers 12 Principles for secure encryption 13 Stream ciphers 14 One-time pad 15 Matrix methods 16 Three pass protocol 17 Codes 18 Quantum computers