|
Official site for the Buckinghamshire stately home, famous for its code-breaking activities during the Second World War.
http://www.bletchleypark.org.uk/
popularity:
history
cryptography
uk
technology
enigma
museum
travel
crypto
security
computer
|
|
Dedicated to the preservation and celebration of computing history.
similarity:
popularity:
history
computer
museum
technology
computers
reference
hardware
science
geek
internet
|
|
Museum of personal computing history and the history of the graphical user interface, in a barn in the mountains above Silicon Valley.
similarity:
popularity:
history
computer
museum
technology
computers
hardware
retro
apple
geek
reference
|
|
The official website of Frank Spiess.
similarity:
popularity:
cryptography
enigma
history
flash
cool
security
encryption
crypto
tools
reference
|
|
UK travel and British history magazine covering travel, news, sports, the monarchy, the arts, science, and British life.
similarity:
popularity:
history
uk
travel
reference
britain
england
british
europe
resources
encyclopedia
|
|
Sikh troops at Alexandra Palace for the coronation of Edward VII, 1902Read more... Dyke and Dryden hair cosmetics, the first to make cosmetic products for the ...
similarity:
popularity:
history
london
museum
uk
museums
photography
travel
design
reference
collection
|
|
Founded in 1895 to preserve places of historic interest or natural beauty permanently for the nation to enjoy.
similarity:
popularity:
history
uk
travel
heritage
conservation
environment
holiday
england
architecture
nature
|
|
Covers conflicts involving Britain and the Commonwealth from the First ... IWM North | HMS Belfast | Churchill Museum & Cabinet War Rooms | IWM Collections ...
similarity:
popularity:
history
museum
london
war
museums
uk
military
travel
england
culture
|
|
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
|
history of computing, computerhistory, history of computers
similarity:
popularity:
history
computer
computing
technology
reference
computers
tech
software
science
timeline
|
|
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|