<--- Back to Details
First PageDocument Content
Software / Software design / Programming paradigms / Edward Yourdon / Software development methodology / Systems engineering process / National Security Agency / Software development process / Modular programming / Computing / Software development / Systems analysis
Date: 2013-01-16 14:16:27
Software
Software design
Programming paradigms
Edward Yourdon
Software development methodology
Systems engineering process
National Security Agency
Software development process
Modular programming
Computing
Software development
Systems analysis

Add to Reading List

Source URL: www.nsa.gov

Download Document from Source Website

File Size: 1,68 MB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xV0o - View Document

Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xUSb - View Document

NSA Global SIGINT Highlights US Intercepts of France Complaining About US Intercepts of France WikiLeaks release: June 23, 2015 Keywords: National Security Agency, NSA, Top Secret, ORCON, NOFORN, COMINT, SIGINT, intellig

DocID: 1vhcN - View Document

NSA Global SIGINT Highlights NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit WikiLeaks release: June 23, 2015 Keywords: National Security Agency, NSA, Top Secret, ORCON, NOFORN, COMINT, SIGI

DocID: 1v67l - View Document

Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

DocID: 1uXkC - View Document