Anbieter: moluna, Greven, Deutschland
EUR 20,60
Anzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New. KlappentextrnrnIdentifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America, and a well researched, detailed report of the U.S. response to the perceived threat. This perception was.
Sprache: Englisch
Verlag: www.MilitaryBookshop.co.uk, 2011
ISBN 10: 1780390084 ISBN 13: 9781780390086
Anbieter: moluna, Greven, Deutschland
EUR 33,98
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. KlappentextrnrnThe art and science of code-making and code-breaking is driven both by the risk inherent in an adversary s ability to read an intercepted communication and the technology available to mitigate that threat efficiently and cost-effe.
EUR 20,09
Anzahl: 1 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Verlag: Center for Cryptologic History, National Security Agency
Zustand: As New. Like New condition. (World War 2, Cryptology) A near perfect copy that may have very minor cosmetic defects.
Verlag: Center for Cryptologic History, National Security Agency, Fort George G. Meade, Maryland
Anbieter: Ground Zero Books, Ltd., Silver Spring, MD, USA
Erstausgabe
Wraps. Zustand: Very good. 61, [3] p. Includes illustrations. From Wikipedia: "The Venona project was a counter-intelligence program initiated by the United States Army Signal Intelligence Service (a forerunner of the National Security Agency) that lasted from 1943 to 1980. The program attempted to decrypt messages sent by Soviet Union intelligence agencies, including its foreign intelligence service and military intelligence services. During the program's four decades, approximately 3, 000 messages were at least partially decrypted and translated. The project produced some of the most important breakthroughs for western counter-intelligence in this period, including the discovery of the Cambridge spy ring and the exposure of Soviet espionage targeting the Manhattan Project. The project was one of the most sensitive secrets of United States intelligence. It remained secret for over a decade after it ended and was not officially declassified until 1995. Presumed first edition/first printing thus.
Verlag: nd. ca. 1995, Fort George C. Meade, Maryland, 1995
Anbieter: Attic Books (ABAC, ILAB), London, ON, Kanada
Booklet. Zustand: Fine. Venona Historical Monograph #4. 12 p. 22 cm. B&w photos. Stapled.
Verlag: National Security Agency, Center for Cryptologic History, Fort George G. Meade, Maryland
Anbieter: Ground Zero Books, Ltd., Silver Spring, MD, USA
Erstausgabe
Pamphlet. Zustand: Very good. Presumed First Edition, First printing. Format is 5.25 inches by 8.5 inches. 1, [1] pages, plus covers. Illustrations. The Cuban Missile Crisis of October 1962 was one of the turning points of the Cold War between the United States and the Soviet Union. At that time the two superpowers came close to war, possibly with nuclear weapons; after it, both countries began to seek ways to adjust to each other, in particular, to prevent the use of nuclear weapons. The events of the Cuban Missile Crisis demonstrated the maturity of the U.S. intelligence community, especially in its ability to collect and analyze information. The crucial roles of human intelligence (HUMINT) and photographic intelligence (PHOTINT) in the Cuban Missile Crisis have been known from the beginning. Documents declassified and released in 1998 now reveal that signals intelligence (SIGINT) also played an exceedingly important part in managing the crisis. J.t NSA, the response to the crisis was led by the director, Lieutenant General Gordon Blake, USAF. Blake had become DlRNSA only three months before, but he had a strong background in communications and intelligence. NSA had deployed a considerable capability around Cuba, including SIGINT collection from ground-based stations and aircraft circling the periphery of the island, just outside Cuban territorial waters. The USS Oxford, a specially configured SIG!NT collection ship, nestled close to the Cuban coastline intercepting radio communications from the island. A Navy SIGINT direction finding net in the Atlantic located the Soviet ships by intercepting and triangulating messages that they were sending back to the Soviet Union. The ships were stopped dead in the water, outside the ring of American naval vessels waiting for them. A confrontation had been averted, one that might have precipitated war.
EUR 33,98
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: www.MilitaryBookshop.co.uk, 2011
ISBN 10: 1780390149 ISBN 13: 9781780390147
Anbieter: moluna, Greven, Deutschland
EUR 25,96
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: WWW MILITARYBOOKSHOP CO UK, 2011
ISBN 10: 1780390335 ISBN 13: 9781780390338
Anbieter: moluna, Greven, Deutschland
EUR 23,28
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. KlappentextrnrnThe position of the National Security Agency (NSA) as the centralized communications intelligence (COMINT) agency for the U.S. government is so well-established that it is difficult to grasp the scope of the lengthy post-World W.
Sprache: Englisch
Verlag: www.MilitaryBookshop.co.uk, 2011
ISBN 10: 1780390092 ISBN 13: 9781780390093
Anbieter: moluna, Greven, Deutschland
EUR 23,28
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: www.MilitaryBookshop.co.uk, 2010
ISBN 10: 1780390130 ISBN 13: 9781780390130
Anbieter: moluna, Greven, Deutschland
EUR 21,94
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 17,92
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. KlappentextWith illustrations and photographsp in full color.
Verlag: National Security Agency, Center for Cryptologic History c. 1980, Fort Meade, MD, 1980
Anbieter: Ground Zero Books, Ltd., Silver Spring, MD, USA
Erstausgabe
Wraps. Zustand: Very good. 23, [1] pages plus covers. Wraps. Illustrations. This contains short biographies (with photographs) of Herbert O. Yardley, William F. Friedman, Laurance F. Safford, Joseph N. Wenger, Frank B. Rowlett, Elizebeth Smith Friedman, and Agnes Meyer Driscoll. The Center for Cryptologic History (CCH) keeps history alive by enhancing the knowledge and decision-making abilities of the intelligence community (IC). A critical asset, the CCH provides a historical and objective account of cryptologic history for the IC, the Department of Defense, other government agencies, academia, and the general public. CCH staff consists of professional historians who are veterans of cryptologic operations. Cryptography, or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymous with encryption, converting information from a readable state to unintelligible nonsense. The sender of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. The cryptography literature often uses the names Alice ("A") for the sender, Bob ("B") for the intended recipient, and Eve ("eavesdropper") for the adversary. Since the development of rotor cipher machines in World War I and the advent of computers in World War II, cryptography methods have become increasingly complex and its applications more varied. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary. While it is theoretically possible to break into a well-designed system, it is infeasible in actual practice to do so. Such schemes, if well designed, are therefore termed "computationally secure"; theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these designs to be continually reevaluated, and if necessary, adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power, such as the one-time pad, but these schemes are much more difficult to use in practice than the best theoretically breakable but computationally secure schemes. The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation. Cryptography also plays a major role in digital rights management and copyright infringement disputes in regard to digital media. Presumed First Edition, First printing thus.
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Books From California, Simi Valley, CA, USA
paperback. Zustand: Very Good.
Sprache: Englisch
Verlag: Www.Militarybookshop.Co.Uk Jan 2011, 2011
ISBN 10: 1780390106 ISBN 13: 9781780390109
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - For more than 30 years, the Vietnamese revolutionary movement successively fought Japan, France, South Vietnam, and the United States of America in its successful struggle to establish an independent and socialist Vietnam. Although many aspects of these wars have been described and analyzed by both the winners and losers, one significant topic has been almost entirely absent from the discussion - the Vietnamese development and use of cryptography to maintain their movement's communications security. 'Essential Matters: A History of the Cryptographic Branch of the People's Army of Viet-Nam, 1945 - 1975', a translation of a 1990 Vietnamese government publication, tells the story of how Vietnamese cryptographers, through trial and error, developed an indigenous cryptography, supplemented by China-trained experts who introduced more sophisticated techniques to enhance their colleagues' efforts. Many of the these revolutionaries were more conversant with French because of that language's dominance in the colonial education system, so they were forced to subject their own language to the most basic analysis of structure, its specialized military and technical vocabulary, the frequencies of its letters and words, and its subsequent rendering for cryptographic and radio transmission purposes, all encouraged at the local level by the revolutionary leadership. The result was the employment of a multiplicity of similar cipher systems, which presented a major challenge to the movement's various military adversaries. 'Essential Matters' records the names of the individuals who performed this arduous work under difficult conditions, describes their training, and portrays their hardships and suffering - approximately 500 Vietnamese cryptographers, nearly 10 percent of those on duty as of 1972, were killed in the course of their duties. This remarkable account, which includes a supplement drawn from 'A History of the Cryptographic Branch of the Border Guard' that extends the coverage of Essential Matters by 14 years, into the cipher machine era, provides a unique portrait of a little-known part of the Vietnamese military and its contribution both to cryptography and the outcome of the Indochina wars.
Sprache: Englisch
Verlag: www.MilitaryBookshop.co.uk, 2011
ISBN 10: 1780390106 ISBN 13: 9781780390109
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Essential Matters | History of the Cryptographic Branch of the People's Army of Vietnam 1945-1975 (with a supplement drawn from "The History of the Cryptographic Branch of the Border Guard, 1959-1989") | Center For Cryptologic History | Taschenbuch | Kartoniert / Broschiert | Englisch | 2011 | [.] | EAN 9781780390109 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu.