First Page | Document Content | |
---|---|---|
Date: 2009-01-23 11:14:40Code Communications security Computer security Transposition cipher Signals intelligence Cryptanalysis Substitution cipher Japanese cryptology from the 1500s to Meiji Jefferson disk Cryptography Security Espionage | e:;. . -- •.Add to Reading ListSource URL: www.nsa.govDownload Document from Source WebsiteFile Size: 3,11 MBShare Document on Facebook |