United States, National Security Agency/Central Security Service | Center for Cryptologic History
Resource Information
The organization United States, National Security Agency/Central Security Service | Center for Cryptologic History represents an institution, an association, or corporate body that is associated with resources found in University of Missouri Libraries.
The Resource
United States, National Security Agency/Central Security Service | Center for Cryptologic History
Resource Information
The organization United States, National Security Agency/Central Security Service | Center for Cryptologic History represents an institution, an association, or corporate body that is associated with resources found in University of Missouri Libraries.
- Label
- United States, National Security Agency/Central Security Service | Center for Cryptologic History
- Subordinate unit
-
- National Security Agency/Central Security Service
- Center for Cryptologic History
50 Items by the Organization United States, National Security Agency/Central Security Service | Center for Cryptologic History
Context
Context of United States, National Security Agency/Central Security Service | Center for Cryptologic HistoryContributor of
No resources found
No enriched resources found
- West wind clear : cryptology and the winds message controversy : a documentary history
- A dangerous business : the U.S. Navy and national reconnaissance during the Cold War : commemorating silent sacrifices
- A history of U.S. communications intelligence during World War II : policy and administration
- A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
- A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
- Army Security Agency aerial reconnaissance : mission and sacrifice
- Brigadier John Tiltman : a giant among cryptanalysts
- Cryptologic aspects of German intelligence activities in South America during World War II
- Settings, keys, hats, and head scratching : the headline puzzle
- Sharing the burden : women in cryptology during World War II
- Sharing the burden : women in cryptology during World War II
- Silent warriors : the Naval Security Group Reserve, 1945-2005
- So power can be brought into play : SIGINT and the Pusan Perimeter
- Solving the enigma : history of the cryptanalytic bombe
- Solving the enigma : history of the cryptanalytic bombe
- The Friedman legacy : a tribute to William and Elizebeth Friedman
- The Friedman legacy : a tribute to William and Elizebeth Friedman
- The Origins of NSA
- The SIGABA /ECM II Cipher Machine : "a beautiful idea"
- The Venona story
- The Venona story
- The capture of the USS Pueblo and its effect on SIGINT operations
- The cryptographic mathematics of Enigma
- The history of traffic analysis : World War I-Vietnam
- The invisible cryptologists : African Americans, WWII to 1956
- The neglected giant : Agnes Meyer Driscoll
- The origins of the National Security Agency, 1940-1952
- The quest for cryptologic centralization and the establishment of NSA : 1940-1952
- The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL
- The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL
- The start of the digital revolution, SIGSALY : secure digital voice communications in World War II
- Eavesdropping on hell : historical guide to Western communications intelligence and the Holocaust, 1939-1945
- Electronic Intelligence (ELINT) at NSA
- Essential matters : a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Public Security Forces), 1959-1989
- German cipher machines of World War II
- Introductory history of VENONA and guide to the translations
- Issues in British and American signals intelligence, 1919-1932
- It wasn't all magic : the early struggle to automate cryptanalysis, 1930s-1960s
- Learning from the enemy : the GUNMAN project
- Listening to the rumrunners
- Listening to the rumrunners : radio intelligence during Prohibition
- Masked dispatches : cryptograms and cryptology in American history, 1775-1900
- Masked dispatches : cryptograms and cryptology in American history, 1775-1900
- Operation Regal : the Berlin Tunnel (S-CCO) [strikethrough]
- Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
- Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
- Radio intelligence on the Mexican border, World War I : a personal view
- Rare books in the National Cryptologic Museum
- Rare books in the National Cryptologic Museum
- Revolutionary secrets : cryptology in the American Revolution
Issuing body of
No resources found
No enriched resources found
- Cryptologic aspects of German intelligence activities in South America during World War II
- Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
- The Venona story
- Essential matters : a history of the Cryptographic Branch of the People's Army of Viet-Nam, 1945-1975 : with a supplement on cryptography in the border guard (formerly the Armed Public Security Forces), 1959-1989
- Solving the enigma : history of the cryptanalytic bombe
- The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL
- The Friedman legacy : a tribute to William and Elizebeth Friedman
- Issues in British and American signals intelligence, 1919-1932
- Revolutionary secrets : cryptology in the American Revolution
- It wasn't all magic : the early struggle to automate cryptanalysis, 1930s-1960s
- The neglected giant : Agnes Meyer Driscoll
- The capture of the USS Pueblo and its effect on SIGINT operations
- Learning from the enemy : the GUNMAN project
- A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians
- The SIGABA /ECM II Cipher Machine : "a beautiful idea"
- Listening to the rumrunners : radio intelligence during Prohibition
- Sharing the burden : women in cryptology during World War II
- The origins of the National Security Agency, 1940-1952
- Masked dispatches : cryptograms and cryptology in American history, 1775-1900
- The history of traffic analysis : World War I-Vietnam
- Operation Regal : the Berlin Tunnel (S-CCO) [strikethrough]
- So power can be brought into play : SIGINT and the Pusan Perimeter
- Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/GOPtIs63ts0/" typeof="Organization http://bibfra.me/vocab/lite/Organization"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/GOPtIs63ts0/">United States, National Security Agency/Central Security Service | Center for Cryptologic History</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Organization United States, National Security Agency/Central Security Service | Center for Cryptologic History
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/GOPtIs63ts0/" typeof="Organization http://bibfra.me/vocab/lite/Organization"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/GOPtIs63ts0/">United States, National Security Agency/Central Security Service | Center for Cryptologic History</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>