NSA Secrets Declassified: Pearl Harbor Revisited, West Wind Clear - Cryptology and the Winds Message Controversy, The Black Chamber, Navy Cryptology, Signal Intelligence, Linguists, Purple Machines

Nonfiction, History, Military, World War II, Social & Cultural Studies, Political Science
Big bigCover of NSA Secrets Declassified: Pearl Harbor Revisited, West Wind Clear - Cryptology and the Winds Message Controversy, The Black Chamber, Navy Cryptology, Signal Intelligence, Linguists, Purple Machines

More books from Progressive Management

bigCover of the book The Next Arms Race: Nuclear Doctrine and Force Posture, Plutonium, Proliferation, Asia and China, Israel's Bomb, Middle East, Nuclear Missile Risks, Aerospace Power, India and Pakistan by
bigCover of the book Power To Explore: History of Marshall Space Flight Center 1960-1990 - von Braun, Apollo, Saturn V Rocket, Lunar Rover, Skylab, Space Shuttle, Challenger Accident, Spacelab, Hubble Space Telescope, ISS by
bigCover of the book Tactical Nuclear Weapons and NATO - From Nuclear Artillery to Ballistic Missiles, TNWs and NSNWs, Nuclear Modernization, Deterrence, Operation Snowcat, Nuclear Zero, TLE (Treaty-limited Equipment) by
bigCover of the book 21st Century Adult Cancer Sourcebook: Paranasal Sinus and Nasal Cavity Cancer - Clinical Data for Patients, Families, and Physicians by
bigCover of the book Black Magic and Gremlins: Analog Flight Simulations at NASA's Flight Research Center (NASA SP-2000-4520), X-15 Simulator, Lifting Body Simulation, Short Take-off and Landing, Boost Vehicles by
bigCover of the book Technology Strategy in Irregular Warfare: High-Tech Versus Right-Tech - Unconventional Warfare, Special Operations, Afghanistan and the Soviet Union, Britain, and America, Aircraft, Artillery by
bigCover of the book Third War: Irregular Warfare on the Western Border 1861-1865 - Civil War, Confederate Guerrillas, Abolitionists, Bushwhackers, Cherokee, Jayhawkers, Highwaymen, Indian Territory-Arkansas by
bigCover of the book Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism by
bigCover of the book Land-Based Air Power in Third World Crises: A Look at Different Types of Crises, Mayaguez Incident, Bay of Pigs, Yom Kippur War, Sub-Saharan Africa by
bigCover of the book FEMA U.S. Fire Administration Emergency Vehicle Visibility and Conspicuity Study: Standards, Retroreflective Technology, Contour Markings by
bigCover of the book Are Muslim Diaspora in the U.S. Vulnerable to Islamic Extremism? Four Terrorist Case Studies, Boston Bombers Tsarnaev, Analysis of Role of Governance, Economics, Religion, U.S. Homeland Involvement by
bigCover of the book Apollo and America's Moon Landing Program: Lunar Dust and Astronaut Spacesuit Contamination, Lessons from the Apollo Moonwalkers, Evaluation of Health Risks to Future Lunar Explorers by
bigCover of the book 21st Century U.S. Military Documents: Guide to Bare Base Mechanical Systems (Air Force Handbook 10-222, Volume 12) - Water Heater, Refrigerator, FDECU, Portable Heater by
bigCover of the book 21st Century Military Documents: Multi-Service Tactics, Techniques, and Procedures for Defense Support of Civil Authorities (DSCA), Integrating with National Guard Civil Support ATP 3-28.1(FM 3-28.1) by
bigCover of the book Military Cyber Attacks and America's Vulnerable Nuclear Weapons and Defenses: DoD Task Force Report on Resilient Military Systems and the Advanced Cyber Threat by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy