Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Alternate Subjects (1-32 of 32)
Cryptography
1
Electronic Book
 

Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing


Hemenway, Brett.
Santa Monica, Calif. : Rand Corporation, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
2
Print Material
 

American signal intelligence in Northwest Africa and Western Europe


Howe, George F. (George Frederick), 1901-1988.
[Fort George G. Meade, Md.] : National Security Agency, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:SI 2    ---  Available
3
Electronic Book
 

Baptism by fire : CIA analysis of the Korean War.



[Washington, D.C.] : [Historical Collections Division of the Central Intelligence Agency], [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  PREX 3.22:K 84/DOCS.    ---  Available
4
Electronic Book
 

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
5
Print Material
 

Code girls : the untold story of the American women code breakers of World War II


Mundy, Liza, 1960- author.
New York : Hachette Books, 2018. 2018

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 2nd Floor Stacks  940.548673 M923c 2018    ---  Available
6
Electronic Book
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943- author.
London : Academic Press, [2017] 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
7
Electronic Book
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943-
Amsterdam ; Boston : Academic Press/Elsevier, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
8
Electronic Book
 

Cryptography for developers


St. Denis, Tom.
Rockland, MA : Syngress Pub., ©2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
9
Print Material
 

Cryptologic aspects of German intelligence activities in South America during World War II


Mowry, David P., author.
Fort George G. Meade, MD : Center for Cryptologic History, National Security Agency, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:G 31/2    ---  Available
10
Electronic Book
 

Disappearing cryptography : information hiding : steganography & watermarking


Wayner, Peter, 1964-
Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002. 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
11
Electronic Book
 

Disappearing cryptography : information hiding : steganography & watermarking


Wayner, Peter, 1964-
Amsterdam ; Boston : Morgan Kaufmann Publishers, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
12
Print Material
 

Frequently asked questions: quantum computing and post-quantum cryptography.



[Fort Meade, Md.] : National Security Agency, 2021. 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.25:Q 2    ---  Available
13
Electronic Book
 

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis


Shavers, Brett, author.
Cambridge, MA : Syngress, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
14
Print Material
 

History of cryptography and cryptanalysis : codes, ciphers, and their algorithms


Dooley, John, 1952- author.
Cham, Switzerland : Springer, [2018] 2018

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 2nd Floor Stacks  652.8 D72h 2018    ---  Available
15
Electronic Book
 

The history of information security : a comprehensive handbook



Amsterdam ; Oxford : Elsevier, 2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
16
Electronic Book
 

History of the Signal Security Agency


United States. Army Security Agency, author.
Washington, D.C. : Army Security Agency, 1947- 1947

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 114.2:SI 2/2/    ---  Available
17
Print Material
 

Issues in British and American signals intelligence, 1919-1932


Ferris, John Robert, 1956- author.
Fort George G. Meade, MD : Center for Cryptologic History, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.132/2:11    ---  Lib Use Only
18
Electronic Book
 

Java cryptography extensions : practical guide for programmers


Weiss, Jason (Jason R.)
San Francisco, CA : Elsevier/Morgan Kaufmann, ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
19
Print Material
 

The Korean War : the SIGINT background


Hatch, David A.
Fort George G. Meade, Md. : National Security Agency, 2000. 2000

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:K 84    ---  Available
20
Electronic Book
 

Military cryptanalysis


Friedman, William F. (William Frederick), 1891-1969, author.
Washington : United States Government Printing Office, 1939-1941. 1941

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:C 88/14    ---  Available
21
Print Material
 

Navajo code talkers


Aaseng, Nathan.
New York, N.Y. : Walker, 2002, c1992. 2002

Rating:

 

Copies

Location Call No. OPAC Message Status
 PCMS Non-Fiction  940.5 AASENG    ---  Available
22
Electronic Book
 

Navajo code talkers' dictionary.



Washington, DC : Dept. of the Navy, Naval Historical Center, [1999] 1999

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 221.2:N 22/2    ---  Available
23
Electronic Book
 

The origins of the National Security Agency, 1940-1952


Burns, Thomas L., author.
[Fort George G. Meade, Md.?] : National Security Agency, Center for Cryptology History, 1990. 1990

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:N 21/4    ---  Available
24
Electronic Book
 

Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941


Parker, Frederick D., author.
Fort George G. Meade, Md. : Center for Cryptologic History, National Security Agency, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:P 32/3/2013    ---  Available
25
Electronic Book
 

A priceless advantage : U.S. Navy communications intelligence and the battles of Coral Sea, Midway,


Parker, Frederick D., author.
Fort George G. Meade, MD : National Security Agency, Center for Cryptologic History, 1993. 1993

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:IN 8/12    ---  Available
26
Electronic Book
 

The quiet heroes of the Southwest Pacific Theater : an oral history of the men and women of CBB and


Maneki, Sharon A., author.
[Fort George G. Meade, Md.] : Center for Cryptologic History, National Security Agency, reprinted 2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:H 43/2007    ---  Available
27
Electronic Book
 

Real Life Cryptology.


Láng, Benedek, 1974-
Amsterdam University Press 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
28
Print Material
 

Secret writing tricks


Lamb, Geoffrey Frederick.
Nashville : T. Nelson, [1975] 1975

Rating:

 

Copies

Location Call No. OPAC Message Status
 Nettels Non-Fiction  652.8 LAMB    ---  Available
29
Electronic Book
 

The SIGABA /ECM II Cipher Machine : "a beautiful idea"


Mucklow, Timothy J., author.
Fort George G. Meade, MD : National Security Agency, Center for Cryptologic History, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:C 49/5    ---  Available
30
Electronic Book
 

The Friedman legacy : a tribute to William and Elizebeth Friedman


Friedman, William F. (William Frederick), 1891-1969, author.
[Fort George G. Meade, Md.] : Center for Cryptologic History, National Security Agency, 2006. 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:F 91/2006    ---  Available
31
Print Material
 

Top secret : a handbook of codes, ciphers, and secret writing


Janeczko, Paul B.
Cambridge, Mass. : Candlewick Press, c2004. 2004

Rating:

 

Copies

Location Call No. OPAC Message Status
 PCMS Non-Fiction  652 JANECZKO    ---  Available
32
Print Material
 

Top secret : a handbook of codes, ciphers, and secret writing


Janeczko, Paul B.
Cambridge, Mass. : Candlewick Press, 2004. 2004

Rating:

 

Copies

Location Call No. OPAC Message Status
 Pittsburg 1st Fl Juvenile Non-Fiction  J 652.8 Jan    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only