Search

Your search keyword '"United States National Security Agency"' showing total 552 results

Search Constraints

Start Over You searched for: Descriptor "United States National Security Agency" Remove constraint Descriptor: "United States National Security Agency"
552 results on '"United States National Security Agency"'

Search Results

1. NSA honors two Cryptologia board members

2. A Study in Complexity: Unintended Consequences of Multiple Stakeholders in the U.S. Presidential Election Process

3. Chilling effects and the stock market response to the Snowden revelations

4. The Ford Administration, the National Security Agency, and the 'Year of Intelligence': Constructing a New Legal Framework for Intelligence

5. Operation 'Olympic Games.' Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran’s nuclear programme

6. Sources and methods for cryptologic history: NSA.gov - a tour through its history and resources

7. Queens of Code

8. Guidelines on Minimum Standards for Developer Verification of Software

9. An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra

10. The spy in Moscow station a counterspy’s hunt for a deadly Cold War threat

11. Stopping the spies: constructing and resisting the surveillance state in South Africa

12. Risk and the Five Hard Problems of Cybersecurity

13. ‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization

14. Too Many Secrets? When Should the Intelligence Community be Allowed to Keep Secrets?

15. Applying Software Assurance and Cybersecurity NICE Job Tasks through Secure Software Engineering Labs

16. Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology

17. Creating a Multifarious Cyber Science Major

19. An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families

20. Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems

21. Intelligence and security

22. Mobility restrictions for the control of epidemics: When do they work?

23. Commercial Solutions for Classified (CSfC): Harnessing the Power of Industry

24. The Role of Industry Partnerships and Collaborations in Information Technology Education

25. From cold to cyber warriors: the origins and expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers

26. Examples of Mimic Defense Application

27. Immersive Collaboration on Data Science for Intelligence Analysis

28. Misapplied metaphors in AI policy

29. An Interview with Snowden’s Lawyer: Robert Tibbo on Whistleblowing, Mass Surveillance and Human Rights Activism

30. Big Data, intelligence, and analyst privacy: investigating information dissemination at an NSA-funded research lab

31. High-throughput configurable SIMON architecture for flexible security

32. The Importance of Organizational Innovation and Adaptation in Building Academic–Industry–Intelligence Collaboration: Observations from the Laboratory for Analytic Sciences

33. New integral attacks on SIMON

34. Security Glitches

35. Surveillance, Authoritarianism and ‘Imperial Effects’ in Pakistan

36. Online Surveillance’s Effect on Support for Other Extraordinary Measures to Prevent Terrorism

37. Terror and technology: domestic intelligence collection and the gossamer of enhanced security

38. William Friedman, Geneticist Turned Cryptographer

39. Edward Snowden, Frenemy of the State

40. Metadata Laws, Journalism and Resistance in Australia

41. An Architecture for Agile Systems Engineering of Secure Commercial Off-the-Shelf Mobile Communications

42. The spy in Moscow station: a counterspy’s hunt for a deadly cold war threat

43. Beyond interactivity: critical/cultural surveillance scholarship, 10 years after Andrejevic

44. A 'Massive and Unprecedented Intrusion'

45. Review of Working on the Dark Side of the Moon: Life Inside the National Security Agency by Thomas Reed Willemain

46. Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile

47. Chapter 9 Government Surveillance, National Security, and the American Rights: Using Sentiment Analysis to Extract Citizen Opinions

48. Academic Cybersecurity Disciplinary Foundations and Accreditation

49. No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333

50. Power Analysis and Protection on SPECK and Its Application in IoT

Catalog

Books, media, physical & digital resources