national-cryptologic-museum-library-catalog_page_229

national-cryptologic-museum-library-catalog | page 229 | https://thedailydialectics.com/pdfs/FIOA/national-cryptologic-museum-library-catalog/national-cryptologic-museum-library-catalog.pdf

national-cryptologic-museum-library-catalog | page 229 | https://thedailydialectics.com/pdfs/FIOA/national-cryptologic-museum-library-catalog/national-cryptologic-museum-library-catalog.pdf

[DISHER (XVIII) COMPUTERS 3, [HORGAN, JOHN’ NSA PROGRAM TO SHIELD COMPUTERS IS CRITICIZED (XVIII) COMPUTERS 3, 28. IEEE / THE INSTITUTE 28. DISHER (IX) INTELLIGENCE 2, 8. HORGAN, JOHN THWARTING THE INFORMATION THIEVES (IX) INTELLIGENCE 2, 8. IEEE SPECTRUM UGS73.H67 19914 BF1028.5.U6.H67 2009 HORN,…

TITLEPUBLISHER41-14102DCONGRESSESTABLISHDATAPROTECTIONBOARD102D
License: CC BY-SA 4.0 · Created by thedailydialectics for educational purposes · Full image