Search Results for - Narrowed by: History. - Cryptography. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509History.$002509History.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300? 2024-06-15T02:51:58Z Versteckte Botschaften : die faszinierende Geschichte der Steganografie ent://SD_ILS/0/SD_ILS:2314676 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format:&#160;Electronic Resources<br/> Rare books in the National Cryptologic Museum. ent://SD_ILS/0/SD_ILS:2310185 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;United States. National Security Agency/Central Security Service. Center for Cryptologic History.<br/><a href="https://learning.oreilly.com/library/view/~/01120100043SI/?ar">https://learning.oreilly.com/library/view/~/01120100043SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100043SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100043SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100043SI">https://learning.oreilly.com/library/view/~/01120100043SI</a><br/>Format:&#160;Electronic Resources<br/> Masked dispatches : cryptograms and cryptology in American history, 1775-1900 ent://SD_ILS/0/SD_ILS:2304646 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Weber, Ralph E. (Ralph Edward), 1926- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100005SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100005SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100005SI/?ar">https://learning.oreilly.com/library/view/~/01120100005SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100005SI">https://learning.oreilly.com/library/view/~/01120100005SI</a><br/>Format:&#160;Electronic Resources<br/> Silent warriors : the Naval Security Group Reserve, 1945-2005 ent://SD_ILS/0/SD_ILS:2290071 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Schindler, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100017SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100017SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100017SI/?ar">https://learning.oreilly.com/library/view/~/01120100017SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100017SI">https://learning.oreilly.com/library/view/~/01120100017SI</a><br/>Format:&#160;Electronic Resources<br/> West wind clear : cryptology and the winds message controversy : a documentary history ent://SD_ILS/0/SD_ILS:2287710 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Hanyok, Robert J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120090001SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120090001SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120090001SI/?ar">https://learning.oreilly.com/library/view/~/01120090001SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120090001SI">https://learning.oreilly.com/library/view/~/01120090001SI</a><br/>Format:&#160;Electronic Resources<br/> The quest for cryptologic centralization and the establishment of NSA : 1940-1952 ent://SD_ILS/0/SD_ILS:2289600 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Burns, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/01120100006SI/?ar">https://learning.oreilly.com/library/view/~/01120100006SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100006SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100006SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100006SI">https://learning.oreilly.com/library/view/~/01120100006SI</a><br/>Format:&#160;Electronic Resources<br/> The Venona story ent://SD_ILS/0/SD_ILS:2290072 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Benson, Robert Louis, author.<br/><a href="https://learning.oreilly.com/library/view/~/01120100016SI/?ar">https://learning.oreilly.com/library/view/~/01120100016SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100016SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100016SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100016SI">https://learning.oreilly.com/library/view/~/01120100016SI</a><br/>Format:&#160;Electronic Resources<br/> The invisible cryptologists : African-Americans, WWII to 1956 ent://SD_ILS/0/SD_ILS:2289571 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;Williams, Jeannette.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100004SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100004SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100004SI/?ar">https://learning.oreilly.com/library/view/~/01120100004SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100004SI">https://learning.oreilly.com/library/view/~/01120100004SI</a><br/>Format:&#160;Electronic Resources<br/> American cryptology : two centuries of tradition ent://SD_ILS/0/SD_ILS:2290890 2024-06-15T02:51:58Z 2024-06-15T02:51:58Z by&#160;United States. National Security Agency.<br/><a href="https://learning.oreilly.com/library/view/~/01120100038SI">https://learning.oreilly.com/library/view/~/01120100038SI</a> <a href="https://learning.oreilly.com/library/view/~/01120100038SI/?ar">https://learning.oreilly.com/library/view/~/01120100038SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100038SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100038SI/?ar</a><br/>Format:&#160;Electronic Resources<br/>