NSA Secrets Declassified: Listening to the Rumrunners: Radio Intelligence during Prohibition, Cryptology, Elizebeth Friedman and USCG Thwart Rumrunners, Invisible Cryptologists: African-Americans

Nonfiction, History, Americas, United States, 20th Century, Social & Cultural Studies, Political Science
Big bigCover of NSA Secrets Declassified: Listening to the Rumrunners: Radio Intelligence during Prohibition, Cryptology, Elizebeth Friedman and USCG Thwart Rumrunners, Invisible Cryptologists: African-Americans

More books from Progressive Management

bigCover of the book U.S. Interagency Regional Foreign Policy Implementation: A Survey of Current Practice and an Analysis of Options for Improvement - Combatant Commands, State Department, Counterterrorism, Iraq War by
bigCover of the book 21st Century U.S. Military Documents: Army Military Intelligence History Sourcebook - Comprehensive History from George Washington to the Civil War, World War I and II, and Desert Storm by
bigCover of the book 21st Century VA Independent Study Course: Caring for War Wounded, Combat Injuries and Effects on Mental Health, Hazards of Deployment to Southwest Asia, Iraq (Veterans Health Issues Series) by
bigCover of the book 21st Century U.S. Military Manuals: Scout Sniping Field Manual - FMFM 1-3B (Value-Added Professional Format Series) by
bigCover of the book The Army and Its Air Corps: Army Policy toward Aviation 1919-1941 - Billy Mitchell, Boeing B-17, Douglas B-7, Charles A. Lindbergh, Henry Hap Arnold, Fokker F-2, Frear Committee by
bigCover of the book Vision, Education and Experimentation: Marine Corps Organizational Behavior and Innovation During the Interwar Period - Gallipoli, Tarawa, John Lejeune, Amphibious Warfare Prophet Ellis, Commandants by
bigCover of the book Understanding the Complexity of Reconciliation, Reintegration and Amnesty for the Enemy in Counterinsurgency Warfare: Vietnam, Dhofar, COIN, Petraeus, Iraq War Surge, Afghanistan, Taliban, Al Qaeda by
bigCover of the book Air Force Doctrine Document 3-12, Cyberspace Operations: Malware, Network Defense, Definitions, Policy and Doctrine, U.S. National Cyberspace Policy, United States Strategic Command by
bigCover of the book FBI Report: Today's FBI Facts & Figures 2010-2011 - Fidelity, Bravery, Integrity - Violent Crime, Public Corruption, Cyber, Counterintelligence, Counterterrorism by
bigCover of the book Intergovernmental Unity of Effort in Support of Biological Threat Prevention: H1N1 Pandemic Influenza Response, Meta-Intelligence, Health Security Policies Lessons Learned by
bigCover of the book U.S. Army Civil Affairs Forces in the Sahel: Developing an Approach to Building Relevant Partner Capacity in Support of U.S. Africa Command - Examples of Boko Haram in Nigeria, Mali Military Coup by
bigCover of the book 21st Century FEMA Study Course: Emergency Support Function #9 Search and Rescue (IS-809) - Search and Rescue (SAR), Urban (US+R), Coast Guard, Structural Collapse by
bigCover of the book Space Shuttle NASA Mission Reports: 1992 Missions, STS-42, STS-45, STS-49, STS-50, STS-46, STS-47, STS-52, STS-53 by
bigCover of the book Space Shuttle NASA Mission Reports: 1996 Missions, STS-72, STS-75, STS-76, STS-77, STS-78, STS-79, STS-80 by
bigCover of the book "We Freeze to Please" - A History of NASA's Icing Research Tunnel and the Quest for Flight Safety (NASA SP-2002-4226) by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy