79 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
United States. National Security Agency.
Showing
1
-
20
of
79
for search:
'United States. National Security Agency.'
, query time: 0.10s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
NSA technology transfer program
by
United
States
.
National
Security
Agency
,
Published: National Security Agency, 2014
Description: 1 online resource (43 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
2
NSA's implementation of Foreign Intelligence Surveillance Act section 702
by
United States. National Security Agency/Central Security Service. Civil Liberties and Privacy Office,
Published: National Security Agency, 2014
Description: 1 online resource (10 pages).
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
3
NSA's civil liberties and privacy protections for targeted SIGINT activities under Executive Order 12333
by
United States. National Security Agency/Central Security Service. Civil Liberties and Privacy Office,
Published: National Security Agency, 2014
Description: 1 online resource (17 unnumbered pages).
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
4
Transparency report : the USA FREEDOM Act business records FISA implementation
by
United States. National Security Agency/Central Security Service. Civil Liberties and Privacy Office,
Published: National Security Agency, 2016
Description: 1 online resource (2 volumes)
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
5
Semi-annual report to Congress
by
United
States
.
National
Security
Agency
/Central Security Service. Office of the Inspector General,
Description: 1 online resource (volumes)
Located:
Loading...
Call Number:
Loading...
Get full text
Serial
Place Hold
Save to List
Saved in:
6
NSA and the Cuban Missile Crisis
Published: National Security Agency, 1999
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
7
The Korean War the SIGINT background
by
Hatch, David A.
Published: National Security Agency, 2000
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
8
The KGB and GRU in Europe, South America, and Australia
Published: National Security Agency, 1995
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Place Hold
Save to List
Saved in:
9
Best practices for keeping your home network secure
Published: National Security Agency, 2011
Description: 1 online resource (8 pages) : color illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
10
The KGB in San Francisco and Mexico City and the GRU in New York and Washington
Published: National Security Agency, 1995
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Place Hold
Save to List
Saved in:
11
Cryptolog
Published: National Security Agency, 1974
Description: 1 online resource (23 volumes)
Located:
Loading...
Call Number:
Loading...
Get full text
Serial
Place Hold
Save to List
Saved in:
12
On watch : profiles from the National Security Agency's past 40 years
Published: National Security Agency, 1984
Description: 1 online resource (iii, 99 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
13
Chinese state-sponsored actors exploit publicly known vulnerabilities
Published: National Security Agency, 2020
Description: 1 online resource (6 pages)
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
14
Frequently asked questions : quantum computing and post-quantum cryptography
Published: National Security Agency, 2021
Description: 1 online resource (8 unnumbered pages)
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
15
The Voynich manuscript an elegant enigma
by
D'Imperio, M. E.
Published: National Security Agency/Central Security Service, 1978
Description: ix, 140 pages : illustrations ; 27 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
16
Securing record communications the TSEC/KW-26
by
Klein, Melville.
Published: [National Security Agency, Central Security Service], 2003
Description: 1 online resource (19 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Place Hold
Save to List
Saved in:
17
American signal intelligence in Northwest Africa and Western Europe
by
Howe, George F. 1901-1988.
Published: National Security Agency, 2010
Description: 1 online resource (xii, 264 pages) : illustrations, maps, portraits.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Place Hold
Save to List
Saved in:
18
Protection profile development : version 1.0
Draft.
Published: National Institute of Standards and Technology : National Security Agency, 1992
Description: 1 volume (various pagings).
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
19
The Voynich manuscript : an elegant enigma
by
D'Imperio, M. E.
Published: National Security Agency/Central Security Service, 1978
Description: 1 online resource (ix, 140 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
20
Space surveillance SIGINT Program (C) [strikethrough]
by
Wagoner, H. D.,
Published: National Security Agency/Central Security Service, 1980
Description: 1 online resource (v, 51 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
Select Page | with selected:
1
2
3
4
Next »
[4]
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Cryptography History
World War, 1939-1945 Cryptography
History
Espionage, Soviet History
United States Foreign relations
World War, 1939-1945 Electronic intelligence
Cryptographers
Cryptography
Intelligence service History
Communication systems
Intelligence service
Korean War, 1950-1953 Military intelligence
World War, 1939-1945 Naval operations, American
Cold War
Computer networks Security measures
Electronic intelligence History
Electronic surveillance
Evaluation
Korean War, 1950-1953 Cryptography
Military intelligence History
Soviet Union Foreign relations History
United States Foreign relations History
World War, 1939-1945
World War, 1939-1945 Campaigns
Civil rights
Computer security
Computer security Standards
Computers Access control
Confidential communications
Coral Sea, Battle of the, 1942
×
Loading...