Cryptologic aspects of German intelligence activities in South America during World War II:
This publication joins two cryptologic history monographs that were published separately in 1989. Part I (German clandestine activites), identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U....
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Fort George G. Meade, MD
Center for Cryptologic History, National Security Agency
2011
|
Schriftenreihe: | United States cryptologic history. Series IV
v. 11 |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/01120100040SI/?ar |
Zusammenfassung: | This publication joins two cryptologic history monographs that were published separately in 1989. Part I (German clandestine activites), identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U.S. response to the perceived threat. Part II (The cryptology of the German intelligence services) deals with the cryptographic systems used by the varioius German intelligence organizations engaged in clandestine activities. |
Beschreibung: | Title from PDF title page (viewed on July 30, 2011). - Includes bibliographical references |
Umfang: | 1 Online-Ressource (vi, 94 Seiten) illustrations. |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051689545 | ||
003 | DE-627-1 | ||
005 | 20240228114800.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2011 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)051689545 | ||
035 | |a (DE-599)KEP051689545 | ||
035 | |a (ORHE)01120100040SI | ||
035 | |a (DE-627-1)051689545 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Mowry, David P. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cryptologic aspects of German intelligence activities in South America during World War II |c David P. Mowry |
264 | 1 | |a Fort George G. Meade, MD |b Center for Cryptologic History, National Security Agency |c 2011 | |
300 | |a 1 Online-Ressource (vi, 94 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a United States cryptologic history. Series IV |v v. 11 | |
500 | |a Title from PDF title page (viewed on July 30, 2011). - Includes bibliographical references | ||
520 | |a This publication joins two cryptologic history monographs that were published separately in 1989. Part I (German clandestine activites), identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U.S. response to the perceived threat. Part II (The cryptology of the German intelligence services) deals with the cryptographic systems used by the varioius German intelligence organizations engaged in clandestine activities. | ||
650 | 0 | |a World War, 1939-1945 |x Cryptography | |
650 | 0 | |a Confidential communications |z Germany | |
650 | 0 | |a World War, 1939-1945 |x Military intelligence |z Germany | |
650 | 0 | |a World War, 1939-1945 |x Electronic intelligence |z Germany | |
650 | 4 | |a World War ; (1939-1945) | |
650 | 4 | |a 1939-1945 | |
650 | 4 | |a Guerre mondiale, 1939-1945 ; Cryptographie | |
650 | 4 | |a Secret professionnel ; Allemagne | |
650 | 4 | |a Guerre mondiale, 1939-1945 ; Renseignement électronique ; Allemagne | |
650 | 4 | |a Confidential communications | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Electronic intelligence | |
650 | 4 | |a Military intelligence | |
650 | 4 | |a Germany | |
710 | 2 | |a United States. |b National Security Agency/Central Security Service. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/01120100040SI/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051689545 |
---|---|
_version_ | 1821494843331837953 |
adam_text | |
any_adam_object | |
author | Mowry, David P. |
author_corporate | United States. National Security Agency/Central Security Service |
author_corporate_role | ctb |
author_facet | Mowry, David P. United States. National Security Agency/Central Security Service |
author_role | aut |
author_sort | Mowry, David P. |
author_variant | d p m dp dpm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051689545 (DE-599)KEP051689545 (ORHE)01120100040SI |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02545cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-051689545</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114800.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051689545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051689545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)01120100040SI</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051689545</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mowry, David P.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptologic aspects of German intelligence activities in South America during World War II</subfield><subfield code="c">David P. Mowry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Fort George G. Meade, MD</subfield><subfield code="b">Center for Cryptologic History, National Security Agency</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vi, 94 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">United States cryptologic history. Series IV</subfield><subfield code="v">v. 11</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from PDF title page (viewed on July 30, 2011). - Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This publication joins two cryptologic history monographs that were published separately in 1989. Part I (German clandestine activites), identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U.S. response to the perceived threat. Part II (The cryptology of the German intelligence services) deals with the cryptographic systems used by the varioius German intelligence organizations engaged in clandestine activities.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World War, 1939-1945</subfield><subfield code="x">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications</subfield><subfield code="z">Germany</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World War, 1939-1945</subfield><subfield code="x">Military intelligence</subfield><subfield code="z">Germany</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">World War, 1939-1945</subfield><subfield code="x">Electronic intelligence</subfield><subfield code="z">Germany</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World War ; (1939-1945)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">1939-1945</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guerre mondiale, 1939-1945 ; Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secret professionnel ; Allemagne</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guerre mondiale, 1939-1945 ; Renseignement électronique ; Allemagne</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Germany</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">United States.</subfield><subfield code="b">National Security Agency/Central Security Service.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/01120100040SI/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051689545 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:49Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (vi, 94 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Center for Cryptologic History, National Security Agency |
record_format | marc |
series2 | United States cryptologic history. Series IV |
spelling | Mowry, David P. VerfasserIn aut Cryptologic aspects of German intelligence activities in South America during World War II David P. Mowry Fort George G. Meade, MD Center for Cryptologic History, National Security Agency 2011 1 Online-Ressource (vi, 94 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier United States cryptologic history. Series IV v. 11 Title from PDF title page (viewed on July 30, 2011). - Includes bibliographical references This publication joins two cryptologic history monographs that were published separately in 1989. Part I (German clandestine activites), identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U.S. response to the perceived threat. Part II (The cryptology of the German intelligence services) deals with the cryptographic systems used by the varioius German intelligence organizations engaged in clandestine activities. World War, 1939-1945 Cryptography Confidential communications Germany World War, 1939-1945 Military intelligence Germany World War, 1939-1945 Electronic intelligence Germany World War ; (1939-1945) 1939-1945 Guerre mondiale, 1939-1945 ; Cryptographie Secret professionnel ; Allemagne Guerre mondiale, 1939-1945 ; Renseignement électronique ; Allemagne Confidential communications Cryptography Electronic intelligence Military intelligence Germany United States. National Security Agency/Central Security Service. MitwirkendeR ctb |
spellingShingle | Mowry, David P. Cryptologic aspects of German intelligence activities in South America during World War II World War, 1939-1945 Cryptography Confidential communications Germany World War, 1939-1945 Military intelligence Germany World War, 1939-1945 Electronic intelligence Germany World War ; (1939-1945) 1939-1945 Guerre mondiale, 1939-1945 ; Cryptographie Secret professionnel ; Allemagne Guerre mondiale, 1939-1945 ; Renseignement électronique ; Allemagne Confidential communications Cryptography Electronic intelligence Military intelligence Germany |
title | Cryptologic aspects of German intelligence activities in South America during World War II |
title_auth | Cryptologic aspects of German intelligence activities in South America during World War II |
title_exact_search | Cryptologic aspects of German intelligence activities in South America during World War II |
title_full | Cryptologic aspects of German intelligence activities in South America during World War II David P. Mowry |
title_fullStr | Cryptologic aspects of German intelligence activities in South America during World War II David P. Mowry |
title_full_unstemmed | Cryptologic aspects of German intelligence activities in South America during World War II David P. Mowry |
title_short | Cryptologic aspects of German intelligence activities in South America during World War II |
title_sort | cryptologic aspects of german intelligence activities in south america during world war ii |
topic | World War, 1939-1945 Cryptography Confidential communications Germany World War, 1939-1945 Military intelligence Germany World War, 1939-1945 Electronic intelligence Germany World War ; (1939-1945) 1939-1945 Guerre mondiale, 1939-1945 ; Cryptographie Secret professionnel ; Allemagne Guerre mondiale, 1939-1945 ; Renseignement électronique ; Allemagne Confidential communications Cryptography Electronic intelligence Military intelligence Germany |
topic_facet | World War, 1939-1945 Cryptography Confidential communications Germany World War, 1939-1945 Military intelligence Germany World War, 1939-1945 Electronic intelligence Germany World War ; (1939-1945) 1939-1945 Guerre mondiale, 1939-1945 ; Cryptographie Secret professionnel ; Allemagne Guerre mondiale, 1939-1945 ; Renseignement électronique ; Allemagne Confidential communications Cryptography Electronic intelligence Military intelligence Germany |
work_keys_str_mv | AT mowrydavidp cryptologicaspectsofgermanintelligenceactivitiesinsouthamericaduringworldwarii AT unitedstatesnationalsecurityagencycentralsecurityservice cryptologicaspectsofgermanintelligenceactivitiesinsouthamericaduringworldwarii |