Search results for: United States. National Security Agency
Showing 1 - 20 results of 96
Refine Results
-
1
NSA technology transfer program.
Published: National Security Agency, 2014Physical Description: 1 online resource (43 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
2
Vietnamese-English vocabulary.
Authors: Nguyễn, Đình Hoà, 1924-2000
Published: Office of Training, National Security Agency, 1955Physical Description: iii, 429 pages ; 27 cmHoldings: Loading…
Book Loading… -
3
Careers for engineers, mathematicians, computer scientists at the National Security Agency.
Published: U.S. Department of Defense, National Security Agency, 1976Physical Description: 16 unnumbered pages : illustrations ; 24 cmHoldings: Loading…
Government Document Book Loading… -
4
Information assurance technical framework.
Published: National Security Agency, 1999Physical Description: 1 computer disc ; 4 3/4 in.Holdings: Loading…
Government Document Software Book Loading… -
5
NSA and the Cuban Missile Crisis.
Published: National Security Agency, 1999Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
6
The Korean War : the SIGINT background
Authors: Hatch, David A.
Published: National Security Agency, 2000Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
7
The 1944-45 New York and Washington-Moscow KGB messages
Published: National Security Agency, 1995Physical Description: 12 pages : illustrations ; 22 cm., Available via Internet from the National Security Agency web site. Address as of 7/72003: http://www.nsa.gov/docs/venona/monographs/monograph-3.html; current access via PURL.Holdings: Loading…Connect to online resource- All users (Federal Depository Library Program Persistant URL)
Government Document Book -
8
The 1942-43 New York-Moscow KGB messages
Published: National Security Agency, 1995Physical Description: 10 pages : illustrations ; 22 cm., Available via Internet from the National Security Agency web site. Address as of 7/7/2003: http://www.nsa.gov/docs/venona/monographs/monograph-2.html; current access via PURL.Holdings: Loading…Connect to online resource- All users (Federal Depository Library Program Persistant URL)
Government Document Book -
9
The KGB in San Francisco and Mexico City and the GRU in New York and Washington
Published: National Security Agency, 1995Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
10
The KGB and GRU in Europe, South America, and Australia
Published: National Security Agency, 1995Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
11
Top to bottom and end to end : improving the National Security Agency's strategic decision processes
Authors: Lewis, Leslie
Published: Rand, 2005Physical Description: xxxiii, 170 pages : illustrations ; 26 cmHoldings: Loading…Connect to: Table of contents - All users (Cataloging @ Library of Congress)
Book -
12
Best practices for keeping your home network secure.
Published: National Security Agency, 2011Physical Description: 1 online resource (8 pages) : color illustrationsHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
13
On watch : profiles from the National Security Agency's past 40 years.
Published: National Security Agency, 1984Physical Description: 1 online resource (iii, 99 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
14
Cryptolog
Published: National Security Agency, 1974Physical Description: 1 online resource (23 volumes)Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic Serial -
15
Chinese state-sponsored actors exploit publicly known vulnerabilities.
Published: National Security Agency, 2020Physical Description: 1 online resource (6 pages)Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
16
Drugs of abuse.
Published: Office of Security, National Security Agency, 1980Physical Description: 41 pages ; 13 x 21 cmHoldings: Loading…
Government Document Book Loading… -
17
Drugs of abuse : a supervisor's guide
Published: The Agency, 1985Physical Description: 41 pages ; 13 x 21 cmHoldings: Loading…
Government Document Book Loading… -
18
NSA/CSS supply catalog descriptive data listing.
Published: Department of Defense, National Security Agency/Central Security Service, 1977Physical Description: 5 volumes : illustrations ; 27 cmHoldings: Loading…
Government Document Book Loading… -
19
The Voynich manuscript : an elegant enigma
Authors: D'Imperio, M. E.
Published: National Security Agency/Central Security Service, 1978Physical Description: ix, 140 pages : illustrations ; 27 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
20
Securing record communications : the TSEC/KW-26
Authors: Klein, Melville
Published: [National Security Agency, Central Security Service], 2003Physical Description: 1 online resource (19 pages) : illustrationsHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook
Related Subjects
Cryptography
History
World War, 1939-1945
Intelligence service
Espionage, Soviet
Military intelligence
Foreign relations
Electronic intelligence
Electronic surveillance
Security measures
Communication systems
Cryptographers
Naval operations, American
Campaigns
Computers
Enigma cipher system
Evaluation
Pearl Harbor (Hawaii), Attack on, 1941
Access control
Cold War
Computer networks
Information networks
Information technology
Korean War, 1950-1953
Military policy
Ciphers
Civil rights
Communications
Computer security
Confidential communications