Reseña del editor:
Excerpt from The Cryptography of Shakespeare, Vol. 1
Mrs. George M. Millard. For the text of passages not included in the foregoing works I have depended either on facsimiles or on reprints. The line numbers in my references to the Shake speare plays and poems are based on the Oxford Shakespeare. For secretarial assistance I am indebted to Miss Dorothy B. Daniels.
About the Publisher
Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.
Reseña del editor:
The following computer-generated description may contain errors and does not represent the quality of the book.
The controversy as to the identity of the author of the Shakespeare plays and poems has involved three kinds of evidence, historical, stylistic, and cryptographic; and in the already extensive literature to which the controversy has given rise this evidence must be carefully sifted from a mass of conjecture which is sometimes plausible and sometimes not. For a general introduction to the literature that deals with the historical evidence that the poet was not the actor William Shakespere the reader may refer toG. G.Greenwood: The Shakespeare Problem Restated. For a general introduction to the literature that deals with the historical and stylistic evidence that the poet was Francis Bacon the reader may refer to Walter Begley: Is It Shakespeare? and Bacons Nova Resuscitatio; R.M. Theobald: Shakespeare Studies in Baconian Light; W.S. Booth: The Droeshout Portrait of William Shakespeare; and J.P. Baxter: The Greatest of Literary Problems. The attempts that have been made to discover cryptographic evidence that Francis Bacon was the author of the Shakespeare plays and poems have been based on a variety of cryptographic methods. Among these methods are the arithmetical cipher, as employed by Ignatius Donnelly in The Great Cryptogram and The Cipher in the Plays and on the Tombstone; the bi-literal cipher, as employed by Elizabeth Wells Gallup in Francis Bacons Bi-Literal Cypher; the word cipher, as employed by Orville W.Owen in Sir Francis Bacons Cipher Story Discovered and Deciphered; the progressive anagram, as employed by an anonymous Shake-spearean in Shakespeare Anagrams; and a variation of this method which is employed by William Stone Booth in Some Acrostic Signatures of Francis Bacon and in The Hidden Signatures of Francesco Colonna and Francis Bacon, and which Mr. Booth sometimes, as in his first title, designates inaccurately as an acrostic method, and sometimes as the method of the string cipher.
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally-enhance the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.
Tags: acrostic letters bacon lines spelling read anagrammatic appears shakespeare consider understood passage method consecutive capitalised cryptographic author cryptography meaning line
"Sobre este título" puede pertenecer a otra edición de este libro.