Search results for: United States. National Security Agency/Central Security Service
Showing 1 - 20 results of 73
Refine Results
-
1
NSA/CSS supply catalog descriptive data listing.
Published: Department of Defense, National Security Agency/Central Security Service, 1977Physical Description: 5 volumes : illustrations ; 27 cmHoldings: Loading…
Government Document Book Loading… -
2
The Voynich manuscript : an elegant enigma
Authors: D'Imperio, M. E.
Published: National Security Agency/Central Security Service, 1978Physical Description: ix, 140 pages : illustrations ; 27 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
3
Securing record communications : the TSEC/KW-26
Authors: Klein, Melville
Published: [National Security Agency, Central Security Service], 2003Physical Description: 1 online resource (19 pages) : illustrationsHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
4
American signal intelligence in Northwest Africa and Western Europe
Authors: Howe, George F. (George Frederick), 1901-1988
Published: National Security Agency, 2010Physical Description: 1 online resource (xii, 264 pages) : illustrations, maps, portraits.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
5
Space surveillance SIGINT Program (C) [strikethrough]
Authors: Wagoner, H. D.
Published: National Security Agency/Central Security Service, 1980Physical Description: 1 online resource (v, 51 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
6
The Voynich manuscript : an elegant enigma
Authors: D'Imperio, M. E.
Published: National Security Agency/Central Security Service, 1978Physical Description: 1 online resource (ix, 140 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
7
The next wave : the National Security Agency's review of emerging technologies.
Physical Description: 1 online resource (volumes)Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic Journal -
8
KMI : key management infrastructure.
Published: U.S. National Security Agency, Information Assurance Directorate, 2002Physical Description: 7 unnumbered pages : illustrations ; 28 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
9
Technology solutions for a safer world.
Published: U.S. National Security Agency, Information Assurance Directorate, 2002Physical Description: 7 unnumbered pages : illustrations ; 28 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
10
Venona release
Published: NSA/CSS, 1995Physical Description: volumes ; 28 cm, Available also at Internet website: http://www.nsa.gov.:8080/docs/venona/venona.html.Holdings: Loading…Connect to online resource - All users
Serial -
11
Masked dispatches : cryptograms and cryptology in American history, 1775-1900
Authors: Weber, Ralph Edward
Published: Center for Cryptologic History, National Security Agency, 1993Physical Description: vi, 236 pages : illustrations, portraits ; 28 cm.Holdings: Loading…
Book Loading… -
12
The Friedman legacy : a tribute to William and Elizabeth Friedman
Published: The Center, 1992Physical Description: v, 282 pages : illustrations, portraits ; 28 cm.Holdings: Loading…
Book Loading… -
13
The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL
Authors: Maneki, Sharon A.
Published: Center for Cryptologic History, National Security Agency, 1996Physical Description: xii, 116 pages : illustrations, maps, portraits ; 28 cm.Holdings: Loading…
Book Loading… -
14
A history of U.S. communications intelligence during World War II : policy and administration
Authors: Benson, Robert Louis
Published: National Security Agency, Center for Cryptologic History, 1997Physical Description: x, 185 pages : illustrations, portraits ; 29 cm.Holdings: Loading…
Book Loading… -
15
Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
Authors: Parker, Frederick D.
Published: National Security Agency, Center for Cryptologic History, 1994Physical Description: v, 98 pages : illustrations, portraits ; 27 cm.Holdings: Loading…
Book Loading… -
16
A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
Authors: Parker, Frederick D.
Published: National Security Agency, Center for Cryptologic History, 1993Physical Description: v, 88 pages : illustrations, maps ; 26 cmHoldings: Loading…
Book Loading… -
17
Rare books in the National Cryptologic Museum.
Published: [Center for Cryptologic History], 1996Physical Description: 13 pages : illustrations ; 22 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
18
American cryptology : two centuries of tradition.
Published: National Security Agency, History and Publications Staff, 1998Physical Description: 3 unnumbered pages : illustrations ; 22 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
19
Sharing the burden : women in cryptology during World War II
Authors: Wilcox, Jennifer
Published: Center for Cryptologic History, National Security Agency, 1998Physical Description: 18 pages : illustrations ; 22 cmHoldings: Loading…
Government Document Microfilm Book Loading… -
20
The invisible cryptologists : African Americans, WWII to 1956
Authors: Williams, Jeannette
Published: Center for Cryptologic History, National Security Agency, 2001Physical Description: vii, 43 pages : illustrations ; 28 cm., Also available via Internet from the NSA Web site. Address as of 11-6-02: http://www.nsa.gov/wwii/papers/invisible%5Fcryptologists.htm; current access is available via PURL.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Microfilm Book
Related Subjects
Cryptography
History
World War, 1939-1945
Electronic intelligence
Foreign relations
Intelligence service
Military intelligence
Electronic surveillance
Communication systems
Cryptographers
Espionage, Soviet
Naval operations, American
Campaigns
Enigma cipher system
Pearl Harbor (Hawaii), Attack on, 1941
Security measures
Cold War
Evaluation
Military policy
Access control
Ciphers
Civil rights
Communications
Computer networks
Computers
Confidential communications
Coral Sea, Battle of the, 1942
Data transmission systems
Digital communications
Diplomatic relations