Works matching United States. National Security Agency
1
- Cryptologia, 1993, v. 17, n. 4, p. 403, doi. 10.1080/0161-119391868024
- Article
2
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 314, doi. 10.1049/iet-ifs.2016.0590
- Sadeghi, Sadegh;
- Bagheri, Nasour
- Article
3
- Harvard National Security Journal, 2022, v. 13, n. 2, p. 224
- Kostyuk, Nadiya;
- Landau, Susan
- Article
4
- International Review of Law, Computers & Technology, 2015, v. 29, n. 1, p. 4, doi. 10.1080/13600869.2015.1014642
- Article
5
- Government Technology, 2013, v. 26, n. 8, p. 36
- Article
7
- Radical Teacher, 2014, v. 99, p. 83, doi. 10.5195/rt.2014.85
- Article
8
- International Journal of Intelligence & Counterintelligence, 2009, v. 22, n. 4, p. 699, doi. 10.1080/08850600903143320
- Article
9
- International Journal of Intelligence & Counterintelligence, 2005, v. 18, n. 2, p. 354, doi. 10.1080/08850600590884810
- Article
10
- International Journal of Intelligence & Counterintelligence, 2004, v. 17, n. 3, p. 449, doi. 10.1080/08850600490446835
- Article
11
- ComputerWorld Hong Kong, 2013, p. 46
- Article
12
- Tulane Journal of Technology & Intellectual Property, 2014, v. 17, p. 365
- Article
13
- Transnational Law & Contemporary Problems, 2014, v. 24, n. 1, p. 243
- Article
14
- Monatsschrift fuer Kriminologie und Strafrechtsreform, 2013, v. 96, n. 6, p. 443, doi. 10.1515/mks-2013-960601
- Article
16
- Harvard Journal of Law & Public Policy, 2015, v. 38, n. 1, p. 117
- Article
18
- Harvard Journal of Law & Public Policy, 2014, v. 37, n. 3, p. 901
- Article
19
- Harvard Journal of Law & Public Policy, 2014, v. 37, n. 3, p. 757
- Article
20
- Pepperdine Policy Review, 2014, v. 7, p. 1
- Article
21
- Journal of Health Care Compliance, 2017, v. 19, n. 3, p. 38
- Article
22
- George Mason Law Review, 2020, v. 28, n. 1, p. 1
- Article
23
- George Mason Law Review, 2016, v. 24, n. 1, p. 285
- Article
24
- Southern California Law Review, 2016, v. 89, n. 5, p. 1203
- Article
25
- Regulation, 2015, v. 38, n. 3, p. 5
- Article
26
- Intelligence & National Security, 2014, v. 29, n. 6, p. 793, doi. 10.1080/02684527.2014.946242
- Johnson, Loch K.;
- Aldrich, Richard J.;
- Moran, Christopher;
- Barrett, David M.;
- Hastedt, Glenn;
- Jervis, Robert;
- Krieger, Wolfgang;
- McDermott, Rose;
- Omand, David;
- Phythian, Mark;
- Wark, Wesley K.
- Article
27
- Intelligence & National Security, 2003, v. 18, n. 4, p. 72, doi. 10.1080/02684520310001688880
- Article
28
- Intelligence & National Security, 2001, v. 16, n. 1, p. 27, doi. 10.1080/02684520412331306200a
- Article
29
- Intelligence & National Security, 2000, v. 15, n. 3, p. 1, doi. 10.1080/02684520008432615
- Article
30
- Intelligence & National Security, 2000, v. 15, n. 1, p. 169, doi. 10.1080/02684520008432591
- Article
31
- Notre Dame Journal of Law, Ethics & Public Policy, 2017, v. 31, n. 1, p. 129
- Article
32
- International Policy Digest, 2015, v. 2, n. 6, p. 22
- Article
33
- International Policy Digest, 2014, v. 1, n. 8, p. 1
- Article
34
- International Policy Digest, 2014, v. 1, n. 1, p. 72
- Article
35
- International Policy Digest, 2014, v. 1, n. 1, p. 71
- Article
36
- German Law Journal, 2015, v. 16, n. 5, p. 1131, doi. 10.1017/s2071832200021064
- Article
37
- Harvard Law & Policy Review, 2016, v. 10, n. 1, p. 255
- Article
38
- Harvard Law & Policy Review, 2014, v. 8, n. 2, p. 281
- Article
39
- Perspectivas Contemporâneas, 2022, v. 17, n. 1, p. 1, doi. 10.54372/pc.2022.v17.3422
- Silva Pereira Junior, Paulo Henrique;
- da Silva Almeida, Victor;
- Moura de Melo, Vitória Luz;
- Pinto de Almeida Bizarria, Fabiana;
- Sampaio Barbosa, Flávia Lorenne
- Article
40
- 2015
- Wood, David Murakami;
- Wright, Steve
- Editorial
41
- Surveillance & Society, 2013, v. 11, n. 1/2, p. 1, doi. 10.24908/ss.v11i1/2.4933
- Ball, Kirstie S.;
- Wood, David Murakami
- Article
42
- Tennessee Law Review, 2015, v. 82, n. 4, p. 937
- Article
43
- 2014
- Mondale, Walter F.;
- Stein, Robert A.;
- Fahnhorst, Monica C.
- Essay
44
- Minnesota Law Review, 2013, v. 98, n. 1, p. 62
- Gray, David;
- Citron, Danielle
- Article
45
- Technology & Culture, 2018, v. 59, n. 1, p. 95, doi. 10.1353/tech.2018.0007
- Article
46
- Library Philosophy & Practice, 2014, p. 1
- Article
47
- Principal Matters, 2013, n. 95, p. 31
- Article
48
- Journal of Digital Forensics, Security & Law, 2021, v. 16, n. 2, p. 1
- Hopkins, Brandon J.;
- Riggle, Kevin A.
- Article
49
- Cleveland State Law Review, 2014, v. 63, n. 1, p. 237
- Article
50
- Reference & User Services Quarterly, 2014, v. 53, n. 3, p. 206
- O'Kelly, Kevin;
- Trott, Barry
- Article