It looks like you're offline.
Open Library logo
additional options menu
Last edited anonymously
April 30, 2008 | History

National Security Agency

We need a photo of National Security Agency

20 works Add another?

Showing all works by author. Would you like to see only ebooks?

  • Cover of: West wind clear: cryptology and the winds message controversy : a documentary history

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Silent Warriors: The Naval Security Group Reserve, 1945-2005

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Quest for Cryptologic Centralization and the Establishment of NSA,1940 - 1952 : Series V: the Early Postwar Period Volume VI

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: NSA Reveals How Codes of Mexico Were Broken (Cryptography Series)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: U.S. Military Intelligence Personnel, 1944-1945

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Vatican Code Systems (Cryptographic Series (C-86))

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Untangling The Web: A Guide To Internet Research

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: National Security Agency and the EC-121 Shootdown

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Index of Coincidence

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Operation REGAL: The Berlin Tunnel

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: The Invisible Cryptologists : African-Americans, WWII to 1956 : Series V: The Early Postwar Period, 1945-1952, Volume 5

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust, 1939-1945

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Battle of the Atlantic: Technical Intelligence from Allied Communications Intelligence

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sharing the Burden: Women in Cryptology during World War II

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: United States Cryptologic History: Essential Matters a History of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Hidden Data and Metadata in Adobe PDF Files: Publication Risks and Countermeasures Enterprise Applications Division of the Systems and Network Analysis Center  Information Assurance Directorate

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: National Security Agency Information Assurance Guidance for Systems Based on a Security Real-Time Operating System: Systems Security Engineering

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Seward's Other Folly: America's First Encrypted Cable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cryptologic Excellence: Yesterday, Today, and Tomorrow

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Information Assurance Directorate: Spotting the Adversary with Windows Event Log Monitoring

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
We need a photo of National Security Agency

Lists

ID Numbers

Links outside Open Library

No links yet. Add one?

History

Download catalog record: RDF / JSON
April 30, 2008 Created by an anonymous user initial import