|
Sharing the Burden: Women in Cryptology during World War II
by
4.75 avg rating — 4 ratings
—
published
2012
|
|
|
Revolutionary Secrets: Cryptology In The American Revolution
by
really liked it 4.00 avg rating — 4 ratings
|
|
|
The Many Lives of Herbert O. Yardley
by
4.50 avg rating — 2 ratings
—
published
2012
|
|
|
Silent Warriors: The Naval Security Group Reserve
by
really liked it 4.00 avg rating — 2 ratings
—
published
2014
|
|
|
Masked Dispatches: Cryptograms and Cryptology in American History, 1775-1900
by
|
|
|
New Research on the Voynich Manuscript: Proceedings of a Seminar
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
Working Against the Tide :
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
Space Surveillance SIGINT Program
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
The Quiet Heroes of the Southwest Pacific Theater: An Oral History of the Men and Women of CBB and FRUMEL
by
it was amazing 5.00 avg rating — 1 rating
—
published
2014
|
|
|
NSA Secrets Declassified: NSA and the Cuban Missile Crisis - SIGINT Role in the Cold War Drama, JFK, Fidel Castro, Khrushchev, Soviet Union Nuclear Missiles, Naval Quarantine
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
Hidden Data and Metadata in Adobe PDF Files: Publication Risks and Countermeasures Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate
by
really liked it 4.00 avg rating — 1 rating
|
|
|
A History of U.S. Communications Intelligence during World War II: Policy and Administration
by
really liked it 4.00 avg rating — 1 rating
|
|
|
A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway and the
by
really liked it 4.00 avg rating — 1 rating
|
|
|
The Friedman Legacy: A Tribute to William and Elizabeth Friedman
by
really liked it 4.00 avg rating — 1 rating
|
|
|
European Axis Signal Intelligence in World War II
by
really liked it 4.00 avg rating — 1 rating
—
published
2010
—
2 editions
|
|
|
Untangling The Web : An NSA Guide to Internet Research
by
really liked it 4.00 avg rating — 1 rating
—
published
2014
|
|
|
The National Security Agency: Missions, Authorities, Oversight and Partnerships
by
liked it 3.00 avg rating — 1 rating
|
|
|
U.S. Military Cryptanalysis : Part I: Monoalphabetic Substitution Systems
by
liked it 3.00 avg rating — 1 rating
—
published
2014
|
|
|
Purple Dragon : The Origin and Development of the United States OPSEC Program
by
liked it 3.00 avg rating — 1 rating
|
|
|
NSA Reveals How Codes of Mexico Were Broken (Cryptography Series)
by
liked it 3.00 avg rating — 1 rating
|
|
|
Battle of the Atlantic
by
liked it 3.00 avg rating — 1 rating
—
published
2013
—
2 editions
|
|
|
Best Practices for Securing Your Home Network: Cybersecurity Information February 2023
by
|
|
|
COMINT and the Sinking of the Battleship YAMATO: Enhanced with Text Analytics and Content by PageKicker Robot Jellicoe
by
did not like it 1.00 avg rating — 1 rating
—
published
2014
|
|
|
Spartans in Darkness : American SIGINT and the Indochina War
by
did not like it 1.00 avg rating — 1 rating
|
|
|
Network Infrastructure Division Systems and Network Analysis Center: Activating Authentication and Encryption for Cisco Unified Communications Manager Express (CUCME) 7.0/4.3
by
0.00 avg rating — 0 ratings
|
|
|
COMINT and the Sinking of the Battleship YAMATO: Enhanced with Text Analytics and Content by PageKicker Robot Jellicoe
by
0.00 avg rating — 0 ratings
|
|
|
Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
by
0.00 avg rating — 0 ratings
—
published
2014
—
2 editions
|
|
|
Breaking the Enigma Code
by
0.00 avg rating — 0 ratings
—
published
2014
|
|
|
Cryptologic Excellence: Yesterday, Today, and Tomorrow
by
0.00 avg rating — 0 ratings
—
published
2012
—
3 editions
|
|
|
The Suez Crisis: A Brief Comint History (U), Speical Series Crisis Collection Voulme 2
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.