WorldCat Identities

United States National Security Agency/Central Security Service

Overview
Works: 172 works in 296 publications in 8 languages and 20,346 library holdings
Genres: History  Periodicals  Biography  Military history  Criticism, interpretation, etc  Personal narratives‡vAmerican 
Classifications: D774.C63, E
Publication Timeline
.
Most widely held works about United States
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by United States
A delicate balance : portfolio analysis and management for intelligence information dissemination programs by Eric Landree( )

2 editions published in 2009 in English and held by 1,822 WorldCat member libraries worldwide

This publication describes the application of the RAND Corporation's Portfolio Analysis and Management Method (PortMan) to the evaluation of the National Security Agency's (NSA) information dissemination program portfolio, which is managed by the NSA Information Sharing Services (ISS) division. RAND's PortMan method enables the data-driven analysis of project portfolios and provides a means to monitor the progress of potentially high-value projects. It also allows portfolio managers to monitor the impact of any mitigation strategies they undertake, ensuring that the portfolio's highest potential value is achieved. For this project, RAND researchers first employed the Delphi method, a process for eliciting group opinion by a series of questionnaires with selective feedback from earlier responses, to collect expert opinion from the ISS Senior Leadership Group. This allowed for an estimation of value and risk for each project. RAND then used these estimates, together with cost information provided by ISS, to develop project rankings and to estimate the expected value-to-cost ratio for each project. RAND selected portfolios of projects that maximized the total expected value for the available program budget using a linear programming method and compared these results to ISS management's funding priorities
Information operations : warfare and the hard reality of soft power by Edwin L Armistead( )

7 editions published in 2004 in English and held by 1,235 WorldCat member libraries worldwide

Fourteen American and Australian educators and practitioners--most associated with the Joint Forces Staff College, others with various branches of the U.S. or Australian national security communities--contribute six chapters on information operations (IO)--the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior in national security affairs. Originally conceived as a textbook for Joint Forces Staff College students, the text traces the history of IO from a doctrinal standpoint and with regard to organizational changes and educational efforts, and covers the capabilities and related activities of information warfare
The Voynich manuscript : an elegant enigma by M. E D'Imperio( )

2 editions published in 1978 in English and held by 486 WorldCat member libraries worldwide

American signal intelligence in Northwest Africa and Western Europe by George F Howe( )

4 editions published between 1980 and 2010 in English and held by 358 WorldCat member libraries worldwide

A study of how U.S. communications intelligence units supported American military operations in NW Africa and Western Europe during WWII
Securing record communications : the TSEC/KW-26 by Melville Klein( )

2 editions published in 2003 in English and held by 305 WorldCat member libraries worldwide

Unclassified report on the President's Surveillance Program( )

3 editions published in 2009 in English and held by 293 WorldCat member libraries worldwide

Space surveillance SIGINT Program (C) [strikethrough] by H. D Wagoner( )

1 edition published in 1980 in English and held by 264 WorldCat member libraries worldwide

The next wave : the National Security Agency's review of emerging technologies( )

in English and held by 66 WorldCat member libraries worldwide

The Next Wave is published to disseminate significant technical advancements and research activities in telecommunications and information technologies. Mentions of company names or commercial products do not imply endorsement by the US Government
Brigadier John Tiltman : a giant among cryptanalysts by John F Clabby( )

1 edition published in 2007 in English and held by 19 WorldCat member libraries worldwide

A biography of Brigadier John Tiltman, cryptanalyst extraordinaire, whose work proved of inestimable value to both U.S. and UK analytic efforts during WWII and into the Cold War
Eavesdropping on hell : historical guide to western communications intelligence and the Holocaust, 1939-1945 by Robert J Hanyok( )

1 edition published in 2005 in English and held by 19 WorldCat member libraries worldwide

"A study of how Allied communications intelligence organizations reported intelligence on the Holocaust. Explains how the Western COMINT system operated during WWII; describes how the wartime records of SIS and GC&CS are organized in the U.S. and UK; summarizes what information is available from SIGINT records about the Holocaust"--Resource description page
The invisible cryptologists : African Americans, WWII to 1956 by Jeannette Williams( )

1 edition published in 2001 in English and held by 19 WorldCat member libraries worldwide

"The story of African-Americans employed by the National Security Agency and its predecessors. It tells of the movement of African-Americans from low-level jobs in segregated work units to their rise to key positions in NSA's structure"--Resource description page
The quest for cryptologic centralization and the establishment of NSA: 1940-1952 by THOMAS L. CENTER FOR CRYPTOLOGIC HISTORY BURNS( )

1 edition published in 2005 in English and held by 19 WorldCat member libraries worldwide

"An account of the evolution of a national SIGINT effort following WWII. A discussion of the fragile trends toward unification of the military services after the war and the unsatisfactory experience under the Armed Forces Security Agency"--Resource description page
Masked dispatches : cryptograms and cryptology in American history, 1775-1900 by Ralph E Weber( )

1 edition published in 2002 in English and held by 19 WorldCat member libraries worldwide

"A collection of essays dealing with episodes in early U.S. history in which cryptology played a notable role"--Resource description page
Attack on the U.S.S. Liberty by William D Gerhard( Book )

2 editions published in 1981 in English and held by 17 WorldCat member libraries worldwide

A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway, and the Aleutians by Frederick D Parker( )

1 edition published in 1993 in English and held by 17 WorldCat member libraries worldwide

The study of how U.S. Navy communications intelligence analysts engineered a triumph over Japanese naval cryptography and contributed to a new naval strategy in the Pacific during WWII
The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and FRUMEL by Sharon A Maneki( )

1 edition published in 2007 in English and held by 17 WorldCat member libraries worldwide

"A look at COMINT production in the Pacific theater during WWII and how diverse aspects of the process combined to produce intelligence distributed to commanders. The story is told primarily through the words of cryptologists who served in the Pacific area"--Resource description page
Silent warriors : the Naval Security Group Reserve, 1945-2005 by John R Schindler( )

1 edition published in 2005 in English and held by 17 WorldCat member libraries worldwide

U.S. Navy and national reconnaissance during the Cold War
Listening to the rumrunners Cover title. - P. 31 signed: David P. Mowry, 1996. - Description based on print version record by David P Mowry( )

1 edition published in 1996 in English and held by 17 WorldCat member libraries worldwide

Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941 by Frederick D Parker( )

1 edition published in 1994 in English and held by 17 WorldCat member libraries worldwide

United States Navy communications intelligence, 1924-1941
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.22 (from 0.02 for Informatio ... to 0.82 for The Friedm ...)

Information operations : warfare and the hard reality of soft power
Covers
Information operations : warfare and the hard reality of soft powerAttack on the U.S.S. Liberty
Alternative Names

controlled identityUnited States. Department of Defense

controlled identityUnited States. National Security Agency

Estados Unidos Central Security Service

Estados Unidos Department of Defense National Security Agency/Central Security Service

Estados Unidos National Security Agency (1972-)

États-Unis Central security service

États-Unis Department of defense National security agency / Central security service

États-Unis National security agency

Maryland Procurement Office

N.S.A./C.S.S.

National security agency

National Security Agency/Central Security Service (Estados Unidos)

National Security Agency/Central Security Service (Spojené státy americké)

National Security Agency/Central Security Service (U.S.)

NSA

NSA/CSS

Spojené státy americké. Central Security Service

Spojené státy americké. Dept. of Defense. National Security Agency/Central Security Service

Spojené státy americké. National Security Agency (1972-)

United States Central Security Service

United States. Department of Defense. National Security Agency/Central Security Service

United States. Dept. of Defense. National Security Agency/Central Security Service

United States National Security Agency (1972- )

United States National Security Agency/Central Security Service

Languages