Collections

Catalog Search

From magnetic tape and rare film to lab notebooks and business plans to early mainframes and source code, our collection is as diverse as the history of computing. It is a rich resource for everyone, comprising historical objects, documents, software titles, ephemera, and photographs and moving images.

Search the Catalog


Catalog contains over 150,474 records.

Result 1-20 of about 29

Breaking Codes Breaking Barriers
US Army Intelligence and Security Command
Document
102803276

Comint Report
National Security Agency
Document, 1963-06-19
102803290

The Evolution of British Sigint

Document
102803278

The Friedman Legacy
National Security Agency
Document, 1992
102803284

The Venona Story
Center for Cryptologic History
Document, 2001
102803277

What Every Cryptologist Should Know About Pearl Harbor
Cryptologic Quarterly
Document, 1987
102803293

Full Circle: Simulating Linux Clusters on Linux Clusters
International Business Machines (IBM)
Document, 2003
102803286

Brilliant Victory: The Chanel Dash of 1942
Operations Security Monograph Series
Document, 1992-04
102803281

The Invisible Cryptologists: African-Americans, WWII to 1956
National Security Agency
Document, 2001
102803274

The Conference on High Speed Computing LLNL/LANL
LLNL
Document, 1997-04-21
102803288

Cluster Computing at Compagnie Generale de Geophysique
Cluster Computing at CGG
Document, 2003-06-25
102803287

National Security Agency 50th 1952 - 2002
National Security Agency
Document, 2002
102803275

Microcomputer Standardization Program at Lawrence Livermore Laboratory
Lawrence Livermore Laboratory
Document, 1977-08-08
102803297

Linux Compute Cluster in the German Automotive Industry
Altreia Solutions
Document, 2003-06-24
102803285

Ultra and the Battle of the Atlantic
Cryptologic Sepectrum
Document, 1978
102803280

The Korean War: The SIGINT Background
National Security Agency
Document, 2000
102803273

power many ClusterWorld Conference & Expo Official Show Guide
ClusterWorld
Document, 2003-06-26
102803289

So Power Can Be Brought into Play: SIGINT and the Pusan Perimeter
Center for Cryptologic History
Document, 2000
102803279