Academic literature on the topic 'National Security Agency (NSA)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'National Security Agency (NSA).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "National Security Agency (NSA)"
Jean, Guilhem. "NSA. National Security Agency / Claude Delesse, Paris, Tallandier, 2016, 512 p." Revue internationale et stratégique N° 102, no. 2 (2016): V. http://dx.doi.org/10.3917/ris.102.0163e.
Full textLong, Austin. "The Quiet Americans? CIA, NSA, and Counterinsurgency." Journal of Cold War Studies 13, no. 3 (2011): 149–84. http://dx.doi.org/10.1162/jcws_r_00146.
Full text문지현. "On the Documents of Record Group 457 U.S. National Archives:U.S. National Security Agency(NSA)/Central Security Serivce(CSS)." EWHA SAHAK YEONGU ll, no. 49 (2014): 297–330. http://dx.doi.org/10.37091/ewhist.2014..49.010.
Full textROADY, PETER. "The Ford Administration, the National Security Agency, and the “Year of Intelligence”: Constructing a New Legal Framework for Intelligence." Journal of Policy History 32, no. 3 (2020): 325–59. http://dx.doi.org/10.1017/s089803062000010x.
Full textMurakami Wood, David, and Steve Wright. "Before and After Snowden." Surveillance & Society 13, no. 2 (2015): 132–38. http://dx.doi.org/10.24908/ss.v13i2.5710.
Full textMunkholm, Johan Lau. "The Pursuit of Full Spectrum Dominance: The Archives of the NSA." Surveillance & Society 18, no. 2 (2020): 244–56. http://dx.doi.org/10.24908/ss.v18i2.13266.
Full textSugiyama, Tara, and Marisa Perry. "The NSA Domestic Surveillance Program: An Analysis of Congressional Oversight During an Era of One-Party Rule." University of Michigan Journal of Law Reform, no. 40.1 (2006): 149. http://dx.doi.org/10.36646/mjlr.40.1.nsa.
Full textKhan, Zmarak. "The National Security Agency (NSA) eavesdropping on Americans A programme that is neither legal nor necessary." Utrecht Law Review 2, no. 2 (2006): 61. http://dx.doi.org/10.18352/ulr.26.
Full textDawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.
Full textWang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.
Full textDissertations / Theses on the topic "National Security Agency (NSA)"
Shackelford, Philip Clayton. "Fighting for Air: Cold War Reorganization and the U.S. Air Force Security Service, 1945-1952." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461432022.
Full textShackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War." Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.
Full textOlson, Allen S. "Classifying PSTN switching stations : a national security agency application /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA354471.
Full textHlavsa, Gary L. "Implementation of the National Security Personnel System at the U.S. Army Chemical Materials Agency." Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FHlavsa%5FJAP.pdf.
Full textFrazão, Pedro Henrique Oliveira. "Um big brother global? os programas de vigilância da NSA à luz da securitização dos espaços sociotecnológicos." Universidade Estadual da Paraíba, 2016. http://tede.bc.uepb.edu.br/tede/jspui/handle/tede/2679.
Full textBernhardt, Wilhelm. "A qualitative conceptual framework for conducting risk- and threat assessment in the South African domestic intelligence environment." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-05052005-162339/.
Full textSanders, Michael. "The USA PATRIOT Act and Punctuated Equilibrium." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2759.
Full textKarlsson, Rikard. "Samverkan och sekretess : en rättsvetenskaplig studie av myndigheters informationsutbyte vid olyckor och extraordinära händelser." Doctoral thesis, Umeå universitet, Juridiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-111204.
Full textLe, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.
Full textSmith, Christopher S. "Exploring the plausibility of a national multi-agency communications system for the Homeland Security Community a Southeast Ohio half-duplex voice over IP case study /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FSmith%5FC.pdf.
Full textBooks on the topic "National Security Agency (NSA)"
United States. National Security Agency/Central Security Service. Center for Cryptologic History, ed. Electronic intelligence (ELINT) at NSA. Center for Cryptologic History, National Security Agency, 2009.
Find full textStreissguth, Thomas. America's security agencies: The Department of Homeland Security, FBI, NSA, and CIA. MyReportLinks.com Books, 2008.
Find full textJohnson, Thomas R. NSA and the Cuban Missile Crisis. Center for Cryptologic History, National Security Agency, 1998.
Find full textGlenn, Greenwald. No place to hide: Edward Snowden, the NSA and the surveillance state. Metropolitan Books, Henry Holt and Company, 2014.
Find full textGlenn, Greenwald. No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Signal, 2015.
Find full textOffice, General Accounting. Intelligence agencies: Personnel practices at CIA, NSA, and DIA compared with those of other agencies. The Office, 1996.
Find full textGlenn, Greenwald. De afluisterstaat: Edward Snowden, de NSA en de Amerikaanse spionage- en afluisterdiensten. Lebowski Publishers, 2014.
Find full textCrowbar, Comet. Cryptocunt and the Eco-Sexuals: The Very Queer Story of the NSA Headquarters in Berlin. Raumschiff Distribution & Press, 2015.
Find full textBamford, James. The shadow factory: The ultra-secret NSA from 9/11 to the eavesdropping on America. Doubleday, 2008.
Find full text1970-, Stark Holger, ed. Der NSA-Komplex: Edward Snowden und der Weg in die totale Überwachung. Deutsche Verlags-Anstalt, 2014.
Find full textBook chapters on the topic "National Security Agency (NSA)"
Tewksbury, Doug. "National Security Agency (NSA)." In Encyclopedia of Big Data. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_143.
Full textTewksbury, Doug. "National Security Agency (NSA)." In Encyclopedia of Big Data. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-32001-4_143-1.
Full textAshur, Tomer, and Atul Luykx. "An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families." In Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_4.
Full textCheney-Lippold, John. "Jus Algoritmi. Wie die National Security Agency die Staatsangehörigkeit neu erfand." In Staat, Internet und digitale Gouvernementalität. Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-18271-7_10.
Full textPolkowska, Małgorzata. "Space Security and Cybersecurity in Poland." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_12.
Full textLi, Nan. "Major Implications for China’s National Security, Civil-Military Cooperation, and Inter-Agency Policy Coordination." In Civil-Military Relations in Post-Deng China. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6442-0_7.
Full textHaysom, Gareth, and Jane Battersby. "Urban Food Security and Resilience." In Resilience and Food Security in a Food Systems Context. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23535-1_11.
Full textFinlan, Alastair. "A Fertile Soil for AI? Defense AI in Sweden." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_5.
Full textMartin, Kévin, and Lucie Liversain. "A Winding Road Before Scaling-Up? Defense AI in France." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_11.
Full textMrabit, Khammar. "Building the Nuclear and Radiological Safety and Security Authority in the Kingdom of Morocco: Sharing Experience and Lessons Learned." In Nuclear Law. T.M.C. Asser Press, 2022. http://dx.doi.org/10.1007/978-94-6265-495-2_15.
Full textConference papers on the topic "National Security Agency (NSA)"
Hartanto, Muji, Muchammad Yusuf, Irvan Sanjaya, and Sunardi. "UX Evaluation of National Social Security Agency for Employment Using User Experience Questionnaire and Heuristic Evaluation." In 2024 9th International Conference on Business and Industrial Research (ICBIR). IEEE, 2024. https://doi.org/10.1109/icbir61386.2024.10875720.
Full textLoomer, Scott A. "Academic research opportunities at the National Geospatial-Intelligence Agency(NGA)." In Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2006. http://dx.doi.org/10.1117/12.673224.
Full textPereira, Fábio Dacêncio, and Edward David Moreno. "Otimização em VHDL e Desempenho em FPGAs do Algoritmo de Criptografia DES." In Workshop em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2003. http://dx.doi.org/10.5753/wscad.2003.19106.
Full textChrane, Colton, and Sathish Kumar. "An Examination of Tor Technology Based Anonymous Internet." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2190.
Full textKawasaki, Charlie. "SECURE WIRELESS ARCHITECTURE FOR GROUND VEHICLES." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3680.
Full textPope, Ronald B., and Richard R. Rawl. "Security in the Transport of Radioactive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77089.
Full textKimminau, Pamela S., and Russell J. Graves. "Promoting Ada at the National Security Agency." In the conference. ACM Press, 1991. http://dx.doi.org/10.1145/126551.126572.
Full textTarmizi, Achmad, Ika Chandra Hapsari, Achmad Nizar Hidayanto, Adhi Yuniarto L.Y., and Herkules. "Information Security Awareness National Nuclear Energy Agency of Indonesia (BATAN)." In 2018 International Conference on Computing, Engineering, and Design (ICCED). IEEE, 2018. http://dx.doi.org/10.1109/icced.2018.00017.
Full textTatum, Paul, James Linford, Jeremy Grabowsky, Lonzell McKenzie, Paul Con Cline, and William Craft. "Multidisciplinary Topics in Senior Capstone Design Courses: Radio Astronomy." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-13358.
Full textDiana, Nirva, Andi Thahir, Tin Amalia Fitri, and Erike Anggraeni. "Social Security System Through National Zakat Agency in Southeast Asian Muslim Countries." In 1st Raden Intan International Conference on Muslim Societies and Social Sciences (RIICMuSSS 2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201113.033.
Full textReports on the topic "National Security Agency (NSA)"
Conner, James. United States Department of Energy / National Nuclear Security Administration (DOE/NNSA) and Japan Atomic Energy Agency (JAEA) Outline for Feasibility Study on a Nuclear Material Accounting and Control System for Measurement of High-Activity Waste at Tokai Reprocessing Plant during Decommissioning. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/1962763.
Full textHlavsa, Gary L. Implementation of the National Security Personnel System at the U.S. Army Chemical Materials Agency. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada483331.
Full textHarrison, W., and G. M. Miller. Argonne's performance assessment of major facility systems to support semiconductor manufacturing by the National Security Agency/R Group, Ft. Meade, Maryland. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/6330109.
Full textSchilling, Bradley. Joint Comments from the Department of Energy, National Nuclear Security Administration (DOE NNSA) Los Alamos Field Office and Triad National Security, LLC on the U.S. Environmental Protection Agency’s New Mexico State-Wide Municipal Separate Storm Sewer System Strawman General Permit. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2342043.
Full textFedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.
Full textMäkelä, Antti, Tapio Tourula, Heikki Tuomenvirta, et al. Climate change impacts to the security of supply. Finnish Meteorological Institute, 2023. http://dx.doi.org/10.35614/isbn.9789523361645.
Full textKoslosky, Luke, Ali Crawford, and Sara Abdulla. Building the Cybersecurity Workforce Pipeline. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/20220005.
Full textEhlschlaeger, Charles, Jeffrey Burkhalter, Imes Chiu, et al. Resilience modeling for civil military operations with the framework incorporating complex uncertainty systems. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47562.
Full textLieberman, Robert J. Statement of Robert J. Lieberman Deputy Inspector General Department of Defense to the Senate Subcommittee on Oversight of Government Management, Restructuring and The District of Columbia and the House Subcommittee on Civil Service and Agency Organization on National Security Implications of the Human Capital Crisis. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada385239.
Full textÖjendal, Joakim, Monin Nong, Chanmony Sean, Zoe Sidana Bunnath, and Chanrith Ngin. The Political Economy of Land-Water Resource Governance in the Context of Food Security in Cambodia. Cambodia Development Resource Institute, 2023. https://doi.org/10.64202/wp.142.202311.
Full text