Statements (55)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:academic_journals
|
gptkbp:archives |
NSA archives
|
gptkbp:available_at |
NSA website
|
gptkbp:editor |
various editors
|
gptkbp:first_published |
gptkb:1990
gptkb:2014 |
gptkbp:focus |
gptkb:crypt
gptkb:computer_science gptkb:Signal network security information security |
https://www.w3.org/2000/01/rdf-schema#label |
NSA Technical Journal
|
gptkbp:issn |
1524-2926
|
gptkbp:language |
English
|
gptkbp:notable_contributor |
NSA employees
|
gptkbp:notable_event |
gptkb:Data_Encryption_Standards
gptkb:BMG_Rights_Management gptkb:Quantum_Cryptography gptkb:forensic_science gptkb:security_services Risk Management Frameworks Secure Communications Information Assurance Network Security Protocols Cybersecurity Challenges Compliance and Regulations Cyber Threat Intelligence Malware Analysis Threat Modeling Advanced Signal Processing Privacy and Data Protection Secure Software Development Blockchain Security Secure Cloud Computing Incident Response Strategies Incident Management Plans Artificial Intelligence in Security Emerging Technologies in Security Io T Security Challenges Mobile Security Risks Penetration Testing Methods Social Engineering Tactics Steganography Techniques The Mathematics of Cryptography Vulnerability Assessment Techniques |
gptkbp:publication_frequency |
irregular
|
gptkbp:publisher |
gptkb:National_Security_Agency
|
gptkbp:subject |
gptkb:Mathematics
engineering information technology computer engineering intelligence studies |
gptkbp:type |
gptkb:academic_journals
|
gptkbp:bfsParent |
gptkb:National_Security_Agency
|
gptkbp:bfsLayer |
3
|