79 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
United States. National Security Agency
Showing
41
-
60
of
79
for search:
'United States. National Security Agency'
, query time: 0.10s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
41
Listening to the rumrunners
by
Mowry, David P.
Published: [National Security Agency, Center for Cryptologic History?], 2002
Description: 34 pages : illustrations ; 22 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
42
Masked dispatches cryptograms and cryptology in American history, 1775-1900
2nd ed. 2002.
by
Weber, Ralph E. 1926-
Published: Center for Cryptologic History, National Security Agency, 2002
Description: vi, 227 pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
43
American cryptology two centuries of tradition
Published: National Security Agency, History and Publications Staff, 1998
Description: 3 unnumbered pages : illustrations ; 22 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
44
A history of U.S. communications intelligence during World War II policy and administration
by
Benson, Robert Louis.
Published: Center for Cryptologic History, National Security Agency, 1997
Description: x, 185 pages : illustrations, portraits ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
45
A priceless advantage U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
by
Parker, Frederick D.
Published: National Security Agency, Center for Cryptologic History, 1993
Description: v, 88 pages : illustrations, maps ; 26 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
46
Essential matters a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Publ...
Published: Center for Cryptologic History, National Security Agency, 1994
Description: xviii, 196 pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
47
The start of the digital revolution, SIGSALY secure digital voice communications in World War II
by
Boone, J. V.
Published: [Center for Cryptologic History, National Security Agency], 2000
Description: 19 pages : illustrations ; 22 cm.
Located:
Loading...
Call Number:
Loading...
Get full text
Microfilm
Place Hold
Save to List
Saved in:
48
Eavesdropping on hell historical guide to Western communications intelligence and the Holocaust, 1939-1945
2nd ed.
by
Hanyok, Robert J.
Published: Center for Cryptologic History, National Security Agency, 2005
Description: v, 167 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
49
KMI key management infrastructure
Published: U.S. National Security Agency, Information Assurance Directorate, 2002
Description: 7 unnumbered pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
50
Technology solutions for a safer world
Published: U.S. National Security Agency, Information Assurance Directorate, 2002
Description: 7 unnumbered pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
51
Sharing the burden women in cryptology during World War II
by
Wilcox, Jennifer.
Published: Center for Cryptologic History, National Security Agency, 1998
Description: 18 pages : illustrations ; 22 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
52
Solving the enigma history of the cryptanalytic bombe
by
Wilcox, Jennifer E.
Published: Center for Cryptologic History, National Security Agency, 2001
Description: 52 pages : illustrations ; 22 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
53
The invisible cryptologists African Americans, WWII to 1956
by
Williams, Jeannette.
Published: Center for Cryptologic History, National Security Agency, 2001
Description: vii, 43 pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Get full text
Microfilm
Save to List
Saved in:
54
Venona Soviet espionage and the American response, 1939-1957
Published: National Security Agency : Central Intelligence Agency, 1996
Description: xliv, 450 pages ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Get full text
Microfilm
Place Hold
Save to List
Saved in:
55
Learning from the enemy : the GUNMAN project
by
Maneki, Sharon A.,
Published: Center for Cryptologic History, National Security Agency, 2012
Description: 1 online resource (31 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
56
Cryptologic aspects of German intelligence activities in South America during World War II
by
Mowry, David P.,
Published: Center for Cryptologic History, National Security Agency, 2011
Description: 1 online resource ( vi, 94 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
57
The SIGABA /ECM II Cipher Machine : "a beautiful idea"
by
Mucklow, Timothy J.
Published: National Security Agency, Center for Cryptologic History, 2015
Description: 1 online resource ( 44 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
58
The origins of the National Security Agency, 1940-1952
by
Burns, Thomas L.,
Published: National Security Agency, Center for Cryptology History, 1990
Description: 1 online resource (vii, 159 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
59
The neglected giant : Agnes Meyer Driscoll
by
Johnson, Kevin Wade,
Published: National Security Agency, Center for Cryptologic History, 2015
Description: 1 online resource (66 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
60
The capture of the USS Pueblo and its effect on SIGINT operations
by
Newton, Robert E.,
Published: Center for Cryptologic History, National Security Agency, 1992
Description: 1 online resource (viii, 236 pages) : illustrations, map.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
Select Page | with selected:
[1]
« Prev
1
2
3
4
Next »
[4]
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Cryptography History
World War, 1939-1945 Cryptography
History
Espionage, Soviet History
United States Foreign relations
World War, 1939-1945 Electronic intelligence
Cryptographers
Cryptography
Intelligence service History
Communication systems
Intelligence service
Korean War, 1950-1953 Military intelligence
World War, 1939-1945 Naval operations, American
Cold War
Computer networks Security measures
Electronic intelligence History
Electronic surveillance
Evaluation
Korean War, 1950-1953 Cryptography
Military intelligence History
Soviet Union Foreign relations History
United States Foreign relations History
World War, 1939-1945
World War, 1939-1945 Campaigns
Civil rights
Computer security
Computer security Standards
Computers Access control
Confidential communications
Coral Sea, Battle of the, 1942
×
Loading...