skip to content

United States National Security Agency/Central Security Service

Overview
Works: 107 works in 147 publications in 3 languages and 7,568 library holdings
Genres: History  Sources  Criticism, interpretation, etc 
Classifications: JK468.I6, 353.172380973
Publication Timeline
Key
Publications about United States
Publications by United States
Most widely held works about United States
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by United States
A delicate balance portfolio analysis and management for intelligence information dissemination programs by Eric Landree( file )
1 edition published in 2009 in English and held by 1,195 libraries worldwide
This publication describes the application of the RAND Corporation's Portfolio Analysis and Management Method (PortMan) to the evaluation of the National Security Agency's (NSA) information dissemination program portfolio, which is managed by the NSA Information Sharing Services (ISS) division. RAND's PortMan method enables the data-driven analysis of project portfolios and provides a means to monitor the progress of potentially high-value projects. It also allows portfolio managers to monitor the impact of any mitigation strategies they undertake, ensuring that the portfolio's highest potential value is achieved. For this project, RAND researchers first employed the Delphi method, a process for eliciting group opinion by a series of questionnaires with selective feedback from earlier responses, to collect expert opinion from the ISS Senior Leadership Group. This allowed for an estimation of value and risk for each project. RAND then used these estimates, together with cost information provided by ISS, to develop project rankings and to estimate the expected value-to-cost ratio for each project. RAND selected portfolios of projects that maximized the total expected value for the available program budget using a linear programming method and compared these results to ISS management's funding priorities
Information operations warfare and the hard reality of soft power by Leigh Armistead( file )
3 editions published in 2004 in English and held by 932 libraries worldwide
Fourteen American and Australian educators and practitioners--most associated with the Joint Forces Staff College, others with various branches of the U.S. or Australian national security communities--contribute six chapters on information operations (IO)--the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior in national security affairs. Originally conceived as a textbook for Joint Forces Staff College students, the text traces the history of IO from a doctrinal standpoint and with regard to organizational changes and educational efforts, and covers the capabilities and related activities of information warfare
The Voynich manuscript an elegant enigma by M. E D'Imperio( Book )
2 editions published in 1978 in English and held by 259 libraries worldwide
In spite of all the papers that others have written about the manuscript, there is no complete survey of all the approaches, ideas, background information and analytic studies that have accumulated over the nearly fifty-five years since the manuscript was discovered by Wilfrid M. Voynich in 1912. This report pulls together all the information the author could obtain from all the sources she has examined, and to present it in an orderly fashion. The resulting survey will provide a firm basis upon which other students may build their work, whether they seek to decipher the text or simply to learn more about the problem
American signal intelligence in Northwest Africa and Western Europe by George F Howe( file )
4 editions published between 1980 and 2010 in English and held by 247 libraries worldwide
Unclassified report on the President's Surveillance Program ( Computer File )
2 editions published in 2009 in English and held by 230 libraries worldwide
Securing record communications the TSEC/KW-26 by Melville Klein( file )
1 edition published in 2003 in English and held by 223 libraries worldwide
Space surveillance SIGINT Program (C) [strikethrough] by H. D Wagoner( file )
1 edition published in 1980 in English and held by 190 libraries worldwide
Attack on the U.S.S. Liberty by William D Gerhard( Book )
2 editions published between 1981 and 1985 in English and held by 19 libraries worldwide
Venona release ( serial )
in English and held by 11 libraries worldwide
Consists of declassified transcripts of U.S. Army's Signal Intelligence Service cryptanalysis project code-named VENONA, partially deciphered intercepts of Soviet KGB and GRU transmissions to Moscow from the U.S. and elsewhere during the period 1941-1946, notably on atomic espionage
American cryptology two centuries of tradition. - Description based on print version record ( file )
1 edition published in 1998 in English and held by 7 libraries worldwide
Solving the enigma history of the cryptanalytic bombe. - Description based on print version record. - P. 38 dated: January 2001 by Jennifer E Wilcox( file )
1 edition published in 2001 in English and held by 7 libraries worldwide
Securing record communications the TSEC/KW-26. - Description based on print version record. - Imprint suggested by NSA on OCLC. by Melville Klein( file )
1 edition published in 2003 in English and held by 7 libraries worldwide
German cipher machines of World War II Description based on print version record by David P Mowry( file )
1 edition published in 2003 in English and held by 7 libraries worldwide
The Venona story Description based on print version record. - Cover title by Robert L Benson( file )
1 edition published in 2001 in English and held by 7 libraries worldwide
Listening to the rumrunners Cover title. - P. 31 signed: David P. Mowry, 1996. - Description based on print version record by David P Mowry( file )
1 edition published in 1996 in English and held by 7 libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Alternative Names

controlled identity United States. Department of Defense

controlled identity United States. National Security Agency

Maryland Procurement Office
N.S.A./C.S.S.
National Security Agency/Central Security Service (U.S.)
NSA
NSA/CSS
United States Central Security Service
United States. Department of Defense. National Security Agency/Central Security Service
United States. Dept. of Defense. National Security Agency/Central Security Service
United States National Security Agency (1972- )
United States National Security Agency/Central Security Service
Languages
English (74)
Chinese (3)
French (1)
Covers
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.