Call Number (LC) Title Results
D 1.2:C 83/2 Setting your course on the information super highway 1
D 1.2:C 83/4 COVID-19 expenses : lessons learned regarding awareness of potential fraud, waste, and abuse risk 1
D 1.2:C 88 American cryptology two centuries of tradition 1
D 1.2:C 88/2 Sharing the burden women in cryptology during World War II 1
D 1.2:C 88/2/2013 Sharing the burden : women in cryptology during World War II 1
D 1.2:C 88/3 The invisible cryptologists African Americans, WWII to 1956 1
D 1.2:C 88/4 Masked dispatches cryptograms and cryptology in American history, 1775-1900 1
D 1.2:C 88/4/2013 Masked dispatches : cryptograms and cryptology in American history, 1775-1900 1
D 1.2:C 88/5 Essential matters a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Public Security Forces), 1959-1989
Essential matters : a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Public Security Forces), 1959-1989
2
D 1.2:C 88/6 West wind clear cryptology and the winds message controversy : a documentary history 1
D 1.2:C 88/7 The quest for cryptologic centralization and the establishment of NSA 1940-1952 1
D 1.2:C 88/8 Brigadier John Tiltman a giant among cryptanalysts 1
D 1.2:C 88/9 Cryptologic excellence yesterday, today, and tomorrow 1
D 1.2:C 88/10/ Cryptolog 1
D 1.2:C 88/11 Revolutionary secrets : cryptology in the American Revolution 1
D 1.2:C 88/12 It wasn't all magic : the early struggle to automate cryptanalysis, 1930s-1960s 1
D 1.2:C 88/13 The neglected giant : Agnes Meyer Driscoll 1
D 1.2:C 88/14 Military cryptanalysis 1
D 1.2:C 88/15 Navy Cryptologic & Cyber Warfare Community vision 1
D 1.2:C 91/2 NSA and the Cuban Missile Crisis 1