So power can be brought into play SIGINT and the Pusan Perimeter /

Main Author: Frahm, Jill,
Other Authors: United States. National Security Agency/Central Security Service. Center for Cryptologic History,
Format: eBook
Language: English
Published: Fort George G. Meade, Maryland : National Security Agency, [Center for Cryptologic History], 2000.
Physical Description: 1 online resource (unpaged) : illustrations, map.
Edition: Revised September 18, 2000.
Subjects:
Online Access: https://purl.fdlp.gov/GPO/LPS23353
LEADER 02719cam a2200577Ii 4500
001 1152882667
003 OCoLC
005 20200619120132.0
006 m o d f
007 cr m||||||||||
008 200501s2000 mduab ob f000 0 eng d
040 |a GPO  |b eng  |e rda  |e pn  |c GPO  |d MvI 
043 |a a-kr--- 
049 |a COM7 
074 |a 0306 (online) 
086 0 |a D 1.2:P 97/3 
100 1 |a Frahm, Jill,  |e author. 
245 1 0 |a So power can be brought into play :  |b SIGINT and the Pusan Perimeter /  |c Jill Frahm. 
246 3 0 |a SIGINT and the Pusan Perimeter. 
250 |a Revised September 18, 2000. 
264 1 |a Fort George G. Meade, Maryland :  |b National Security Agency, [Center for Cryptologic History],  |c 2000. 
300 |a 1 online resource (unpaged) :  |b illustrations, map. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
500 |a "NSA Korean War 1950-1953 commemoration." 
500 |a GPO Cataloging Record Distribution Program (CRDP). 
504 |a Includes bibliographical references. 
588 |a Description based on online resource, HTML version; title from caption (viewed May 1, 2020). 
650 0 |a Korean War, 1950-1953  |x Military intelligence. 
650 0 |a Korean War, 1950-1953  |x Cryptography. 
650 7 |a Cryptography.  |2 fast. 
650 7 |a Military intelligence.  |2 fast. 
647 7 |a Korean War  |d (1950-1953)  |2 fast. 
648 7 |a 1950-1953  |2 fast. 
710 1 |a United States.  |b National Security Agency/Central Security Service.  |b Center for Cryptologic History,  |e issuing body. 
776 0 8 |i Print version:  |a Frahm, Jill.  |t So power can be brought into play.  |d [Fort George G. Meade, Md.] : Center for Cryptologic History, National Security Agency, 2000  |w (OCoLC)46486378. 
776 0 8 |i Microfiche version:  |a Frahm, Jill.  |t So power can be brought into play.  |d [Fort George G. Meade, Md.] : Center for Cryptologic History, National Security Agency, 2000  |w (OCoLC)51023847. 
856 4 0 |u https://purl.fdlp.gov/GPO/LPS23353 
907 |a .b61320195  |b cug   |c -  |d 200611  |e 230210 
998 |a cug  |b 210520  |c m  |d a   |e -  |f eng  |g mdu  |h 0  |i 1 
948 |a MARCIVE Overnight, in 2023.02 
948 |a MARCIVE Over, 06/2021 
948 |a MARCIVE Overnight, 06/2020 
995 |a Loaded with m2btab.ltiac in 2023.02 
995 |a Loaded with m2btab.ltiac in 2021.06 
995 |a Loaded with m2btab.b in 2021.05 
995 |a Loaded with m2btab.b in 2020.07 
995 |a Loaded with m2btab.ltiac in 2020.07 
995 |a Loaded with m2btab.msgov7 in 2020.07 
989 |a D 1.2:P 97/3  |d cuege  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 216  |k 200611  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w US Gov Docs  |1 .i130567036