Search results for: United States. National Security Agency
Showing 61 - 80 results of 96
Refine Results
-
61
German cipher machines of World War II
Authors: Mowry, David P.
Published: Center for Cryptologic History, National Security Agency, 2003Physical Description: 1 online resource (31 pages) : illustrationsHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
62
Electronic Intelligence (ELINT) at NSA
Authors: Bernard, Richard L.
Published: Center for Cryptologic History, National Security Agency, 2009Physical Description: 1 online resource (14 pages) : illustrationsHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
63
Revolutionary secrets : cryptology in the American Revolution
Authors: Wilcox, Jennifer
Published: Center for Cryptologic History, National Security Agency, 2012Physical Description: 1 online resource (54 pages) : illustrations (some color)Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
64
It wasn't all magic : the early struggle to automate cryptanalysis, 1930s-1960s
Authors: Burke, Colin B., 1936-
Published: Center for Cryptologic History, National Security Agency, 2002Physical Description: 1 online resource (xii, 344 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
65
Operation Regal : the Berlin Tunnel (S-CCO) [strikethrough].
Published: National Security Agency/Central Security Service, 1988Physical Description: 1 online resource (v, 29 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
66
The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL
Authors: Maneki, Sharon A.
Published: Center for Cryptologic History, National Security Agency, 2007Physical Description: 1 online resource (xii, 102 pages) : illustrations, maps.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
67
The Friedman legacy : a tribute to William and Elizebeth Friedman
Authors: Friedman, William F. (William Frederick), 1891-1969
Published: Center for Cryptologic History, National Security Agency, 2006Physical Description: 1 online resource (viii, 213 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
68
Essential matters : a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Pu...
Published: Center for Cryptologic History, National Security Agency, 1994Physical Description: 1 online resource (223 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
69
A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
Authors: Parker, Frederick D.
Published: National Security Agency, Center for Cryptologic History, 1993Physical Description: 1 online resource (v, 88 pages) : illustrations, maps.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
70
Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
Authors: Parker, Frederick D.
Published: Center for Cryptologic History, National Security Agency, 2013Physical Description: 1 online resource (90 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
71
Solving the enigma : history of the cryptanalytic bombe
Authors: Wilcox, Jennifer E.
Published: Center for Cryptologic History, National Security Agency, 2006Physical Description: 1 online resource (55 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
72
Masked dispatches : cryptograms and cryptology in American history, 1775-1900
Authors: Weber, Ralph Edward
Published: Center for Cryptologic History, National Security Agency, 2013Physical Description: 1 online resource (xvi, 202 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
73
Sharing the burden : women in cryptology during World War II
Authors: Wilcox, Jennifer
Published: Center for Cryptologic History, National Security Agency, 2013Physical Description: 1 online resource (18 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
74
Cryptologic aspects of German intelligence activities in South America during World War II
Authors: Mowry, David P.
Published: Center for Cryptologic History, National Security Agency, 2011Physical Description: 1 online resource ( vi, 94 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
75
Learning from the enemy : the GUNMAN project
Authors: Maneki, Sharon A.
Published: Center for Cryptologic History, National Security Agency, 2012Physical Description: 1 online resource (31 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
76
The SIGABA /ECM II Cipher Machine : "a beautiful idea"
Authors: Mucklow, Timothy J.
Published: National Security Agency, Center for Cryptologic History, 2015Physical Description: 1 online resource ( 44 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
77
The origins of the National Security Agency, 1940-1952
Authors: Burns, Thomas L.
Published: National Security Agency, Center for Cryptology History, 1990Physical Description: 1 online resource (vii, 159 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
78
The Venona story
Authors: Benson, Robert Louis
Published: Center for Cryptologic History, 2001Physical Description: 1 online resource (61 pages) : illustrationsHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
79
Listening to the rumrunners : radio intelligence during Prohibition
Authors: Mowry, David P.
Published: Center for Cryptologic History, 2014Physical Description: 1 online resource (40 pages) : illustrations, portraitHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
80
The neglected giant : Agnes Meyer Driscoll
Authors: Johnson, Kevin Wade
Published: National Security Agency, Center for Cryptologic History, 2015Physical Description: 1 online resource (66 pages) : illustrations (some color).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook
Related Subjects
Cryptography
History
World War, 1939-1945
Intelligence service
Espionage, Soviet
Military intelligence
Foreign relations
Electronic intelligence
Electronic surveillance
Security measures
Communication systems
Cryptographers
Naval operations, American
Campaigns
Computers
Enigma cipher system
Evaluation
Pearl Harbor (Hawaii), Attack on, 1941
Access control
Cold War
Computer networks
Information networks
Information technology
Korean War, 1950-1953
Military policy
Ciphers
Civil rights
Communications
Computer security
Confidential communications