SEARCH THE HSDL

Advanced search    Help

Searching for terms: EXACT: "United States. National Security Agency"   in: publisher

Set an Alert to get future results

Results  91 - 110 (of 110)          sorted by relevance     sort by date

Clear all search criteria

Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).

  • TOKENEER User Authentication Techniques Using Public Key Certificates Part 3: An Example Implementation
    United States. National Security Agency/Central Security Service
    Reinert, Lawrence A.; Luther, Stephen C.
    1998-02-10
  • TOKENEER User Authentication Techniques Using Public Key Certificates Part 2: Authentication Information Including Biometrics
    United States. National Security Agency/Central Security Service
    Reinert, Lawrence A.; Luther, Stephen C.
    1997-12-31
  • TOKENEER Authentication Protocol for Smartcards
    United States. National Security Agency/Central Security Service
    1998-01-23
  • Korean War: The SIGINT Background
    United States. National Security Agency/Central Security Service
    Hatch, David A.; Benson, Robert Louis
  • SIGINT and the Pusan Perameter
    United States. National Security Agency/Central Security Service
    Frahm, Jill
  • Release of Documents Related to Vietnam War POW/MIA Cases
    United States. National Security Agency/Central Security Service
    2014-12-11
  • Automating NIAP Requirements Testing for Mobile Apps
    United States. Department of Homeland Security; United States. National Security Agency
    2020-06-29
  • Purple Dragon: The Origin and Development of the United States OPSEC Program
    United States. National Security Agency/Central Security Service. Center for Cryptologic History
    1993
  • Common Criteria for Information Technology Security Evaluation, Part Two: Security Functional Requirements
    National Institute of Standards and Technology (U.S.); United States. National Security Agency
    1999-08
  • Common Criteria for Information Technology Security Evaluation, Part One: Introduction and General Model
    National Institute of Standards and Technology (U.S.); United States. National Security Agency
    1999-08
  • Common Criteria for Information Technology Security Evaluation, Part Three: Security Assurance Requirements
    National Institute of Standards and Technology (U.S.); United States. National Security Agency
    1999-08
  • United States Foreign Intelligence Surveillance Court: Memorandum of the United States in Response to the Court's Order Dated January 28, 2009, February 17, 2009
    United States. Office of the Director of National Intelligence; United States. National Security Agency
    2009-02-17
  • Joint Statement of Lisa O. Monaco, John C. Inglis, and Robert S. Litt at a Hearing Concerning 'FISA Amendments Act Reauthorization' Before the Permanent Select Committee on Intelligence, House of Representatives, December 8, 2011
    United States. National Security Agency; United States. Department of Justice; United States. Office of the Director of National Intelligence
    Monaco, Lisa Oudens, 1968-; Inglis, John C.; Litt, Robert S. (Robert Stephen), 1949-
    2011-12-08
  • Joint Statement of Lisa O. Monaco, John C. Inglis, and Robert S. Litt at a Hearing Concerning 'FISA Amendments Act Reauthorization' Before the Permanent Select Committee on Intelligence, House of Representatives, February 9, 2012
    United States. Office of the Director of National Intelligence; United States. Department of Justice; United States. National Security Agency
    Inglis, John C.; Litt, Robert S. (Robert Stephen), 1949-; Monaco, Lisa Oudens, 1968-
    2012-02-09
  • So Power Can Be Brought into Play: SIGINT and the Pusan Perimeter
    United States. National Security Agency/Central Security Service. Center for Cryptologic History
    Frahm, Jill
    2000
  • NSA and CISA Recommend Immediate Actions to Reduce Exposure Across All Operational Technologies and Control Systems
    United States. National Security Agency; United States. Department of Homeland Security. Cybersecurity and Infrastructure Security Agency
    2020-07
  • [Guidelines for Application Whitelisting in Industrial Control Systems]
    United States. Department of Homeland Security; United States. National Security Agency; Industrial Control Systems Cyber Emergency Response Team . . .
  • Advisory: APT29 Targets COVID-19 Vaccine Development
    United Kingdom. National Cyber Security Centre; Communications Security Establishment (Canada); United States. Department of Homeland Security. Cybersecurity and Infrastructure Security Agency . . .
    2020-07-16
  • Unclassified Report on the President's Surveillance Program
    United States. Department of Justice. Office of the Inspector General; United States. Department of Defense. Office of the Inspector General; United States. Central Intelligence Agency. Inspector General . . .
    2009-07-10
  • (U) Report on the President's Surveillance Program
    United States. Department of Defense. Office of the Inspector General; United States. Department of Justice. Office of the Inspector General; United States. Central Intelligence Agency. Inspector General . . .
    2009-07-10
      1   2   3   4