79 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
United States. National Security Agency
Showing
61
-
79
of
79
for search:
'United States. National Security Agency'
, query time: 0.14s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
61
The Venona story
by
Benson, Robert Louis,
Published: Center for Cryptologic History, 2001
Description: 1 online resource (61 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
62
The neglected giant : Agnes Meyer Driscoll
by
Johnson, Kevin Wade,
Published: National Security Agency, Center for Cryptologic History, 2015
Description: 1 online resource (66 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
63
Listening to the rumrunners : radio intelligence during Prohibition
Second edition 2014.
by
Mowry, David P.,
Published: Center for Cryptologic History, 2014
Description: 1 online resource (40 pages) : illustrations, portrait.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
64
Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
Third edition 2013.
by
Parker, Frederick D.,
Published: Center for Cryptologic History, National Security Agency, 2013
Description: 1 online resource (90 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
65
Solving the enigma : history of the cryptanalytic bombe
Revised 2006.
by
Wilcox, Jennifer E.,
Published: Center for Cryptologic History, National Security Agency, 2006
Description: 1 online resource (55 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
66
Masked dispatches : cryptograms and cryptology in American history, 1775-1900
Third edition.
by
Weber, Ralph E. 1926-
Published: Center for Cryptologic History, National Security Agency, 2013
Description: 1 online resource (xvi, 202 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
67
The capture of the USS Pueblo and its effect on SIGINT operations
by
Newton, Robert E.,
Published: Center for Cryptologic History, National Security Agency, 1992
Description: 1 online resource (viii, 236 pages) : illustrations, map.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
68
The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL
by
Maneki, Sharon A.,
Published: Center for Cryptologic History, National Security Agency, 2007
Description: 1 online resource (xii, 102 pages) : illustrations, maps.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
69
The Friedman legacy : a tribute to William and Elizebeth Friedman
Third printing.
by
Friedman, William F. 1891-1969,
Published: Center for Cryptologic History, National Security Agency, 2006
Description: 1 online resource (viii, 213 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
70
Essential matters : a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Pu...
Published: Center for Cryptologic History, National Security Agency, 1994
Description: 1 online resource (223 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
71
A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
by
Parker, Frederick D.,
Published: National Security Agency, Center for Cryptologic History, 1993
Description: 1 online resource (v, 88 pages) : illustrations, maps.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
72
Sharing the burden : women in cryptology during World War II
by
Wilcox, Jennifer,
Published: Center for Cryptologic History, National Security Agency, 2013
Description: 1 online resource (18 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
73
So power can be brought into play : SIGINT and the Pusan Perimeter
by
Frahm, Jill,
Published: Center for Cryptologic History, National Security Agency, 2000
Description: 1 online resource (18 pages) : illustrations, color map.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
74
Issues in British and American signals intelligence, 1919-1932
by
Ferris, John Robert, 1956-
Published: Center for Cryptologic History, 2016
Description: 1 online resource (vi, 60 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
75
So power can be brought into play : SIGINT and the Pusan Perimeter
Revised September 18, 2000.
by
Frahm, Jill,
Published: National Security Agency, [Center for Cryptologic History], 2000
Description: 1 online resource (unpaged) : illustrations, map.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
76
Understanding and mitigating Russian states-sponsored cyber threats to U.S. critical infrastructure
by
United States. Cybersecurity & Infrastructure Security Agency,
Published: Cybersecurity & Infrastructure Security Agency : Department of Justice Federal Bureau of Investigation : National Security Agency, 2022
Description: 1 online resource (12 pages)
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
77
Revolutionary secrets : cryptology in the American Revolution
by
Wilcox, Jennifer,
Published: Center for Cryptologic History, National Security Agency, 2012
Description: 1 online resource (54 pages) : illustrations (some color)
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
78
It wasn't all magic : the early struggle to automate cryptanalysis, 1930s-1960s
by
Burke, Colin B., 1936-
Published: Center for Cryptologic History, National Security Agency, 2002
Description: 1 online resource (xii, 344 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
79
Unclassified report on the President's Surveillance Program
Published: U.S. Dept. of Defense, 2009
Description: ii, 38 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Place Hold
Save to List
Saved in:
Select Page | with selected:
[1]
« Prev
1
2
3
4
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Cryptography History
World War, 1939-1945 Cryptography
History
Espionage, Soviet History
United States Foreign relations
World War, 1939-1945 Electronic intelligence
Cryptographers
Cryptography
Intelligence service History
Communication systems
Intelligence service
Korean War, 1950-1953 Military intelligence
World War, 1939-1945 Naval operations, American
Cold War
Computer networks Security measures
Electronic intelligence History
Electronic surveillance
Evaluation
Korean War, 1950-1953 Cryptography
Military intelligence History
Soviet Union Foreign relations History
United States Foreign relations History
World War, 1939-1945
World War, 1939-1945 Campaigns
Civil rights
Computer security
Computer security Standards
Computers Access control
Confidential communications
Coral Sea, Battle of the, 1942
×
Loading...