A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | ISBN | Title | Biblio AU$ | Abebooks US$ | Bookfinder A$ | ||||||||||||||||||||||
2 | 089412255X: | Two-Over-One Game Force Bidding Problems, No 1 (B-1) | 85.14 | 63.93 | |||||||||||||||||||||||
3 | 0894122584: | The Play of the Cards- Self-Quizzes at Bridge (B-2) | 27.27 | 23.39 | 167.14 | ||||||||||||||||||||||
4 | 0894122576: | The Drawing of Trumps and Its Postponement (B-3) | 13.98 | 80.12 | |||||||||||||||||||||||
5 | 0894122606: | Splinters and Other Shortness Bids (B-4) | |||||||||||||||||||||||||
6 | 0894122592: | New Minor, Fourth Suit, Forcing Notrump Responses : The Complete | 33.79 | 17.98 | 37.56 | ||||||||||||||||||||||
7 | 0894120018: | Manual for the Solution of Military Ciphers (Cryptographic Series) | 115.07 | 48 | 128.41 | c-1 | C-1 - https://www.gutenberg.org/ebooks/48871 | ||||||||||||||||||||
8 | 089412000X: | Cryptanalysis of the Simple Substitution Cipher With Word Divisions | 681.82 | 981.19 | c-2 | (Barker) | |||||||||||||||||||||
9 | 0894120026: | Elements of Cryptanalysis (Cryptographic Series) | 145.88 | 601.55 | c-3 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_237/41760269079943.pdf | |||||||||||||||||||||
10 | 0894120069: | Statistical Methods in Cryptanalysis (Cryptographic Series) | 159.8 | 120 | 199.6 | c-4 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_228/41760349079953.pdf | ||||||||||||||||||||
11 | 0894120034: | Cryptography and Cryptanalysis Articles (Cryptographic Series) | 46.69 | 125 | 75.33 | c-5 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_205/41762559080174.pdf | ||||||||||||||||||||
12 | 0894120042: | Cryptography and Cryptanalysis Articles (Cryptographic Series) | 75 | 140.01 | c-6 | https://drive.google.com/drive/folders/1d1XMvg8DI-lcjRJstViPhDW8AGNmyyzs?usp=sharing | |||||||||||||||||||||
13 | 0894120107: | Elementary Military Cryptography | 119.85 | 90 | 41.28 | c-7 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_236/41760629079976.pdf | ||||||||||||||||||||
14 | 0894120115: | Advanced Military Cryptography (Cryptographic Series) | 99.88 | 80 | 139.5 | c-8 | http://index-of.es/Varios-2/Advanced%20Military%20Cryptography.pdf | ||||||||||||||||||||
15 | 0894120190: | Solving German Codes in World War I (Cryptographic Series) | 110.14 | 151.45 | c-11 | https://www.nsa.gov/Portals/75/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_437/41751269079046.pdf | |||||||||||||||||||||
16 | 0894120182: | History of the Use of Codes | 67.12 | 49.95 | 97.8 | c-12 | https://www.google.com.au/books/edition/Report_on_the_History_of_the_Use_of_Code/XGk0AAAAMAAJ?hl=en&gbpv=1 | ||||||||||||||||||||
17 | 0894122398: | Zimmermann Telegram of January 16 1917 and Its Cryptographic | 83.84 | 62.96 | c-13 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/lectures-speeches/FOLDER_198/41766889080599.pdf | |||||||||||||||||||||
18 | 0894120166: | Manual of Cryptography (Cryptographic Series) - Sacco | 106.54 | 60 | 547.76 | c-14 | 1977 from "United States Government Printing Office Washington 1941" translated from "Manuale di Crittografia" - https://drive.google.com/drive/folders/1jQ64F-fsqBCZDV6_ErtQ4zCiVqw_VXWy | ||||||||||||||||||||
19 | 0894120255: | Origin and Development of the Army Security Agency 1917-1947 1978 | 126.51 | 95 | 153.74 | c-16 | |||||||||||||||||||||
20 | 0894120220: | Cryptanalysis of the Hagelin Cryptograph (Cryptographic Series) 1977 | 163.81 | 200 | 210.49 | c-17 | https://archive.org/details/hagelin | ||||||||||||||||||||
21 | 0894120271: | The Contribution of the Cryptographic Bureaus in the World War (1978) | 71.12 | c-18 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_213/41760699079984.pdf | ||||||||||||||||||||||
22 | 089412028X: | Course in Cryptography (Cryptographic Series) - Givierge | 126.51 | 95 | 167.18 | c-19 | https://drive.google.com/drive/folders/1jQ64F-fsqBCZDV6_ErtQ4zCiVqw_VXWy | ||||||||||||||||||||
23 | 0894120263: | History of Codes and Ciphers in the United States Prior to World | c-20 | Barker, 1978/1992 - "essentially [the 1946 Historical Section of the Army Security Agency document] Historical Background of the Signal Security Agency, Volume I, Codes and Ciphers prior to World War I (1776-1917)" https://drive.google.com/file/d/1ofBrunlQ3b7Twrm9wGz1MkjBBz1YPoZc/view?usp=sharing | |||||||||||||||||||||||
24 | 089412031X: | History of Codes and Ciphers in the U S During World War 1 | 62.64 | 125 | 101.19 | c-21 | Volume II - Codes and Ciphers during World War I (1917-1919) https://drive.google.com/file/d/17syEPF2Bya8F6P85J-D0_4CmdXpqx5Dw/view?usp=sharing | ||||||||||||||||||||
25 | 0894120395: | History of Codes and Ciphers in the U.S. During the Period Between | 156.47 | 22.81 | 51.61 | c-22 | Volume III - Codes and Ciphers during the Peace (1919-1939) https://drive.google.com/file/d/1D92WP7Yfs6w680YTmqG0YZxa_YFzrMuo/view?usp=sharing | ||||||||||||||||||||
26 | 0894120328: | The Riverbank Publications, Vol 1 (C-23) publications 15-18 | 113.19 | 154.81 | c-23 | https://www.marshallfoundation.org/library/wp-content/uploads/sites/16/2014/06/Methods_II_watermark.pdf | (contains all those publications, and The Index of Coincidence and its Applications in Cryptanalysis) | ||||||||||||||||||||
27 | 0894120336: | The Riverbank Publications, Vol 2 (C-24) publications 19-21 | c-24 | ||||||||||||||||||||||||
28 | 0894120344: | The Riverbank Publications, Vol 3 (C-25) publication 22 (IC) | c-25 | ||||||||||||||||||||||||
29 | 0894120379: | Cryptanalysis of an Enciphered Code Problem: Where an Additive | 107.35 | 142.06 | c-26 | https://archive.org/details/cryptanalysis-of-an-enciphered-code-problem.-wayne-g-barker.-c-26 | |||||||||||||||||||||
30 | 0894120387: | Voynich Manuscript an Elegant Enigma (Cryptographic Series) | 45.82 | 30 | 61.79 | c-27 | https://apps.dtic.mil/sti/pdfs/ADA070618.pdf | ||||||||||||||||||||
31 | 0894120425: | Manual of Cryptography - British War Office | 113.19 | 85 | 139.59 | c-28 | British War Office, printed in 1911: https://library.marshallfoundation.org/Portal/Default/en-US/RecordView/Index/15282 | ||||||||||||||||||||
32 | 0894120441: | Military Cryptanalysis, Part I, Monoalphabetic Substitution Systems | 79.9 | 60 | 117.51 | c-30 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_241/41748389078762.pdf | ||||||||||||||||||||
33 | 0894120522: | Course in Cryptanalysis: Explanatory Text and Short Exercises/Si | c-33 | https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Historical-Releases/Friedman-Documents/Publications/ Search for "S.I. Course" for both volumes and other related material | |||||||||||||||||||||||
34 | 0894120530: | Course in Cryptanalysis: Figures and Cipher Test/Si Course | 99.88 | 75 | 139.5 | c-34 | |||||||||||||||||||||
35 | 0894120549: | Origin and Development of the National Security Agency | 126.51 | 95 | 146.3 | c-35 | Part V is at https://history.state.gov/historicaldocuments/frus1950-55Intel/d121 or see https://www.governmentattic.org/44docs/NSAoriginsOfNSA1940-1952_1990.pdf | ||||||||||||||||||||
36 | 0894120557: | Treatise on Cryptography: An English Translation of the Original "Traite De Cryptographie" | 66.59 | 50 | 102.87 | c-36 | Equivalent to https://archive.org/details/cryptography00lang and original at https://gallica.bnf.fr/ark:/12148/bpt6k932140s.image | ||||||||||||||||||||
37 | 0894120573: | Solving Cypher Secrets (Cryptographic Series (C-37)) | 106.52 | 69.99 | 108.89 | c-37 | https://toebes.com/Flynns/Flynns.htm | ||||||||||||||||||||
38 | 0894120611: | Cryptography, A Study on Secret Writings | 159.8 | 120 | 199.6 | c-38 | https://archive.org/details/cryptographylang00lang | ||||||||||||||||||||
39 | 089412062X: | Cryptanalysis of Shift Register Generated Stream Cipher Systems | 243.91 | 424.26 | 298.6 | c-39 | ** to be uploaded ** | ||||||||||||||||||||
40 | 0894120646: | Military Cryptanalysis, Part II, With Added Problems and | 76.56 | 60 | 100.68 | c-40 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_508/41784299082338.pdf | ||||||||||||||||||||
41 | 0894120727: | Elementary Course in Probability for Cryptanalyst (Cryptographic | 59.93 | 45 | c-41 | https://drive.google.com/file/d/129y7_4z1eb3iCxcqwDHX8PesSwSWjYuW/view?usp=sharing | Gleason | ||||||||||||||||||||
42 | 0894120735: | Military Cryptanalytics, Part I, Volume 1 (Cryptographic Series) | 326.69 | 100 | c-42 | Non-Aegean Park Press PDFs for parts 1-3 can be found in the following locations: Part I: https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_245/41748799078803.pdf Part I, Problem Book: https://www.nsa.gov/portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_250/41748609078779.pdf Part II, Interim Edition, First Section: https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_253/41752229079148.pdf Part II, Interim Edition, Second Section: https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_257/41751589079090.pdf Part II, Interim Edition, Third Section: https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_257/41751819079101.pdf Part III (Callimahos): https://www.governmentattic.org/39docs/NSAmilitaryCryptalyticsPt3_1977.pdf | |||||||||||||||||||||
43 | 0894120743: | Military Cryptanalytics, Part I, Volume 2 | 166.46 | 125 | 196.18 | c-43 | |||||||||||||||||||||
44 | 0894120751: | Military Cryptanalytics, Part II, Volume 1 (Cryptographic Series) | 346.53 | 932.93 | 411.48 | c-44 | |||||||||||||||||||||
45 | 089412076X: | Military Cryptanalytics, Part II, Volume 2: Includes Problems and Computer Programs | 393.46 | 456.78 | c-45 | ||||||||||||||||||||||
46 | 0894121359: | Pattern Words: Three Letters to Eight Letters in Length | 219.65 | 164.94 | 228.09 | c-46 | Sheila A. Carlisle | ||||||||||||||||||||
47 | 0894121464: | Pattern Words Nine-Letters in Length | c-48 | Sheila A. Carlisle | |||||||||||||||||||||||
48 | 0894121375: | The Index of Coincidence and Its Applications in Cryptanalysis | 159.8 | 120 | 199.6 | c-49 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_233/41761039080018.pdf https://www.marshallfoundation.org/library/wp-content/uploads/sites/16/2014/06/Methods_II_watermark.pdf https://www.cryptomuseum.com/people/friedman/files/TIOC_Aegean_1987.pdf | ||||||||||||||||||||
49 | 0894121502: | Cryptographic Significance of the Knapsack Problem Plus Exercises | 37.69 | 35.15 | c-50 | see TOC at https://documents.uow.edu.au/~jennie/WEBPDF/117_1988.pdf | |||||||||||||||||||||
50 | 0894121545: | The American Black Chamber (Cryptographic Series) | 59.93 | 21.6 | c-52 | https://www.marshallfoundation.org/library/digital-archive/american-black-chamber-annotated-digital/ | |||||||||||||||||||||
51 | 0894121618: | Traffic Analysis and the Zendian Problem (Cryptographic Series) | c-53 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_257/41751819079101.pdf | |||||||||||||||||||||||
52 | 0894121650: | The History of Codes and Ciphers in the U.S. During the Period Between the World Wars: 1930-1939 | 150 | 332.2 | c-54 | compare to c-22? | |||||||||||||||||||||
53 | 0894121693: | Introduction to the Analysis of the Data Encryption Standard - Barker | 66.59 | 50 | 90.25 | c-55 | https://archive.org/details/introductiontoan0000bark | ||||||||||||||||||||
54 | 0894121731: | Elementary Cryptography and Cryptanalysis (Cryptography Series) | 159.8 | 120 | 199.6 | c-56 | Donald Millikin: https://archive.org/details/elementary-cryptography-and-cryptanalysis.-donald-d-millikin.-c-56 | ||||||||||||||||||||
55 | 0894121758: | Secret Ciphers of the 1876 Presidential Election (Cryptographic | 166.46 | 125 | 196.18 | c-57 | https://archive.org/details/1876-election | ||||||||||||||||||||
56 | 0894121782: | Solving Cipher Problems (Cryptographic Series) | c-58 | Frank W. Lewis: https://archive.org/details/solving-cipher-problems.-frank-l-lewis.-c-58_202203 | |||||||||||||||||||||||
57 | 0894121928: | Cryptanalysis of the Single Columnar Transposition Cipher With | 112.5 | 88.99 | 127.04 | c-59 | https://archive.org/details/cryptanalysis-of-the-single-columnar-transposition-cipher.-wayne-g-barker.-c-59 | ||||||||||||||||||||
58 | 0894121960: | Military Cryptanalysis: Simpler Varieties of Aperiodic Substitution | 34.06 | 65 | c-60 | https://www.nsa.gov/Portals/75/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_258/41761619080075.pdf | |||||||||||||||||||||
59 | 0894121987: | Military Cryptanalysis: Transposition and Fractionating Systems | 133.17 | 100 | 173.67 | c-61 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/military-cryptanalysis/mil_crypt_IV.pdf | ||||||||||||||||||||
60 | 0894122045: | Pattern Words: Ten and Eleven Letters in Length (Cryptographic | c-62 | Robert W. Wallace | |||||||||||||||||||||||
61 | 0894122061: | Pattern Words: Twelve Letters and Greater in Length (Cryptographic | c-63 | Robert W. Wallace | |||||||||||||||||||||||
62 | 0894122223: | U.S. Naval Cryptographic Activities in the Philippines Prior to | 366.22 | 275 | c-64 | https://drive.google.com/file/d/19CKN5Jbe1CjuBD5vnam7-SOiCgPHN4mO/view?usp=sharing | |||||||||||||||||||||
63 | 0894122290: | U. S. Naval Communications Intelligence Activities (Cryptographic | 191.19 | 234.28 | c-65 | SRH 149, 150, 151, 152, 197 -- https://drive.google.com/file/d/1exlPsfdiEmD_0rHzWMz7NynsMmU2xGMi/view?usp=sharing https://drive.google.com/file/d/1VSE9M4zWZ5q4spEulVfJMh7NoPKKROV6/view?usp=sharing https://drive.google.com/file/d/1nrSvgQ7wh_SpX4VDWucyhsxhs1c9wtGL/view?usp=sharing https://drive.google.com/file/d/12p33pPSSYwR7kVKZ2g8w6G7e-70OnxEe/view?usp=sharing https://drive.google.com/file/d/12p33pPSSYwR7kVKZ2g8w6G7e-70OnxEe/view?usp=sharing | |||||||||||||||||||||
64 | 0894122452: | Fundamentals of Traffic Analysis (Radio-Telegraph (Cryptographic | c-66 | https://cryptome.org/2015/04/nsa-traffic-analysis-1948.pdf | |||||||||||||||||||||||
65 | 0894122460: | Six Lectures Concerning Cryptography and Cryptanalysis | 133.17 | 100 | c-67 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/ACC15281/41785109082412.pdf | |||||||||||||||||||||
66 | 0894122487: | The Des: An Extensive Documentation and Evaluation of the Data | 199.76 | 150 | c-68 | Simovits | |||||||||||||||||||||
67 | 0894122541: | Cryptanalysis of the Double Transposition Cipher: Includes Problems | 167.23 | 108 | c-69 | https://drive.google.com/file/d/1-EDMya9uCNIfIyEcYN8tsRSEeREzkUbR/view?usp=sharing | |||||||||||||||||||||
68 | 0894122509: | Achievements of the Signal Security Agency in World War II | c-70 | https://www.governmentattic.org/4docs/AchievementsSSA-WWII_1946.pdf | |||||||||||||||||||||||
69 | 0894122525: | An Historical Bibliography of Cryptology to 1945 (Cryptographic | 53.27 | 25 | 70.67 | c-71 | Joseph S. Galland - https://arch.library.northwestern.edu/concern/generic_works/9k41zd612 | ||||||||||||||||||||
70 | 0894122614: | Secret & Urgent: The Story of Codes & Ciphers | 364.17 | c-72 | Original from 1939-1942 is much cheaper https://www.bookfinder.com/search/?ac=sl&st=sl&ref=bf_s2_a1_t1_1&qi=GCJ,gtmwsbPHVDmFTjYNxFneiqo_1497963026_1:1:2&bq=author%3Dfletcher%2520pratt%26title%3Dsecret%2520and%2520urgent https://archive.org/details/secreturgentstor0000flet | ||||||||||||||||||||||
71 | 0894122622: | Cryptanalysis of the Single Rotor Cipher Machine (Cryptographic | c-73 | Donald A. Dawson - not the Carleton professor. **to be scanned** | |||||||||||||||||||||||
72 | 0894122630: | Classical Cryptography Course, Volume 1 | 99.88 | 75 | 541.16 | c-74 | https://www.cryptogram.org/resource-area/crypto-lessons-tutorials-lanaki/ | ||||||||||||||||||||
73 | 0894122649: | Classical Cryptography Course, Volume 2, | c-76 | ||||||||||||||||||||||||
74 | 0894122657: | Venona, Soviet Espionage and the American Response (C-75) | 82.18 | 33 | 210.23 | c-75 | https://www.cia.gov/static/fc3235f14ff505b6f839321755cfe72d/Venona-Soviet-Espionage-and-The-American-Response-1939-1957.pdf | ||||||||||||||||||||
75 | 0894122665: | Descriptive Dictionary of Cryptologic Terms (Cryptographic | c-77 | ? https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_234/41761109080025.pdf | |||||||||||||||||||||||
76 | 0894122673: | Cryptology, System Identification and Key-Clustering (C-78) | c-78 | https://drive.google.com/file/d/1AHdWJK61em0obv1HI22If-2EF7VptRZH/view?usp=sharing | |||||||||||||||||||||||
77 | 089412272X: | Basic Cryptanalysis, Field Manual 34-40-2 | c-79 | http://www.contestcen.com/ArmyFieldManual.pdf | |||||||||||||||||||||||
78 | 0894122746: | U.S. Army Signals Intelligence in World War II (Cryptography) | c-80 | https://history.army.mil/html/books/070/70-43/index.html | |||||||||||||||||||||||
79 | 0894122738: | The Story of Magic, Memoirs of an American Cryptologic Pioneer | 136.1 | 150 | 239.85 | c-81 | |||||||||||||||||||||
80 | 0894122754: | Briefing Notes Concerning Analysis of German Air-Force Low-Level | 8.99 | 32.06 | c-82 | GCCS 1944 lecture? | |||||||||||||||||||||
81 | 0894122770: | NSA Cryptologic Documents | 99.88 | 75 | 125.6 | c-83 | NARA list C-83 corrected ISBN | ||||||||||||||||||||
82 | 0894122789: | General Solution for the Double Transposition Cipher (Cryptographic | c-84 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_439/41751169079035.pdf | |||||||||||||||||||||||
83 | 0894122797: | Russian Cryptology During World War II | c-85 | https://www.glaronia.com/js/doc/8SJb81IyPhTk59d42I8Gm83a-6k8H5K181Vc4wXA5m2ZQwL7S-K6ZH3cod2F3vrZ2Ml61WBu87.pdf | |||||||||||||||||||||||
84 | 0894122800: | Vatican Code Systems (Cryptographic Series (C-86)) | c-86 | https://archive.org/details/vaticancodesystems | |||||||||||||||||||||||
85 | 0894122827: | U.S. Revolutionary Period Cryptography | c-87 | "Secret Writing in the Revolutionary Period" | |||||||||||||||||||||||
86 | 0894122843: | General Solution of the ADFGVX Cipher System | c-88 | https://drive.google.com/file/d/1_JiNMck7eUvdrOTrH7fsj1Yh44t-VSC6/view?usp=sharing | |||||||||||||||||||||||
87 | 0894122894: | NSA Reveals How Codes of Mexico Were Broken (Cryptography Series) | c-89 | ??? can't find original document with name close to this. "The solutions of the systems, MXC, MXD, MXE, and MXH, as titled by NSA, are described in detail. " (national archives) | |||||||||||||||||||||||
88 | 0894122916: | Handbook for Cryptanalysis (Cryptographic Series) | c-90 | https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_244/41748049078724.pdf | "Standardization of cryptographic procedure", "Stereotypic beginnings and endings", "the solution of 2-square matrices", "the probable word method" | ||||||||||||||||||||||
89 | 0894122908: | Big Machines (A Crytographic Series) | 32.1 | c-91 | https://drive.google.com/file/d/1_ELaSuClNcY8NO_a3Y9oCbS8CKsK8IIm/view?usp=sharing | C-91 reprinted as ISBN 9781478793984 | |||||||||||||||||||||
90 | 0894120662: | The Defection of Igor Gouzenko, Volume 1 | 89.9 | 122.86 | |||||||||||||||||||||||
91 | 0894120670: | The Defection of Igor Gouzenko, Volume 2 | |||||||||||||||||||||||||
92 | 0894120689: | The Defection of Igor Gouzenko, Volume 3 | 89.9 | 122.86 | |||||||||||||||||||||||
93 | 0894121332: | Intelligence and Cryptanalytic Activities of the Japanese During | |||||||||||||||||||||||||
94 | 0894121561: | Evolution and Organization of Intelligence Activities in the United | 71.12 | ||||||||||||||||||||||||
95 | 0894122029: | Selection of Personnel for Clandestine Operations: Assessment of | |||||||||||||||||||||||||
96 | 0894122312: | The History of Special Branch M.I.S. in World War II (Intelligence | https://drive.google.com/file/d/17syEPF2Bya8F6P85J-D0_4CmdXpqx5Dw/view?usp=sharing | ||||||||||||||||||||||||
97 | 0894122355: | Ultra in the Atlantic: Allied Communications Intelligence and the | 116.63 | 33.94 | 110.93 | ||||||||||||||||||||||
98 | 0894122363: | Ultra in the Atlantic: U-Boat Operations (Intelligence Series , Vol | 76.65 | 39.95 | |||||||||||||||||||||||
99 | 0894122371: | Ultra in the Atlantic: German Naval Communications Intelligence | 154.8 | 60 | 146.3 | ||||||||||||||||||||||
100 | 089412238X: | Ultra in the Atlantic: Technical Intelligence from Allied | 152.37 | 60 |