LEADER 02223oam 2200637Ia 450 001 9910700818803321 005 20140610080920.0 035 $a(CKB)5470000002412832 035 $a(OCoLC)747250485 035 $a(EXLCZ)995470000002412832 100 $a20110819d1986 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCommunications platform payload definition study$b[electronic resource] /$f[H.W. Clopp, and others] ; prepared by RCA Astro-Electronics Division ; prepared for NASA Lewis Research Center 210 1$aPrinceton, N.J. :$cRCA Astro-Electronics Division,$d[1986] 215 $a1 online resource (2 volumes) $cillustrations 225 1 $aNASA CR ;$v174985-86 300 $a"July 1986." 320 $aIncludes bibliographical references. 327 $av. 1. Executive summary. -- v. 2. Technical report. 606 $aCommunication satellites$2nasat 606 $aCost analysis$2nasat 606 $aGeosynchronous orbits$2nasat 606 $aOrbit spectrum utilization$2nasat 606 $aSatellite design$2nasat 606 $aSatellite transmission$2nasat 606 $aSynchronous platforms$2nasat 606 $aSynchronous satellites$2nasat 606 $aSpacecraft communication$2nasat 606 $aSystems analysis$2nasat 606 $aTechnology assessment$2nasat 615 7$aCommunication satellites. 615 7$aCost analysis. 615 7$aGeosynchronous orbits. 615 7$aOrbit spectrum utilization. 615 7$aSatellite design. 615 7$aSatellite transmission. 615 7$aSynchronous platforms. 615 7$aSynchronous satellites. 615 7$aSpacecraft communication. 615 7$aSystems analysis. 615 7$aTechnology assessment. 701 $aClopp$b H. W$01416833 712 02$aLewis Research Center. 712 02$aRCA Corporation.$bGovernment Systems Division.$bAstro-Electronics. 801 0$bGPO 801 1$bGPO 801 2$bOCLCQ 801 2$bGPO 906 $aBOOK 912 $a9910700818803321 996 $aCommunications platform payload definition study$93523544 997 $aUNINA LEADER 04389nam 2200853Ia 450 001 9910260644203321 005 20200520144314.0 010 $a9786612096266 010 $a9780262262514 010 $a0262262517 010 $a9780262256018 010 $a0262256010 010 $a9781282096264 010 $a1282096265 035 $a(CKB)2670000000544767 035 $a(EBL)3338688 035 $a(SSID)ssj0000283143 035 $a(PQKBManifestationID)11236298 035 $a(PQKBTitleCode)TC0000283143 035 $a(PQKBWorkID)10336817 035 $a(PQKB)10178254 035 $a(CaBNVSL)mat06267248 035 $a(IDAMS)0b000064818b4200 035 $a(IEEE)6267248 035 $a(OCoLC)731211540$z(OCoLC)939263700$z(OCoLC)1059008778 035 $a(OCoLC-P)731211540 035 $a(MaCbMITP)5572 035 $a(OCoLC)1053171939 035 $a(MdBmJHUP)muse70624 035 $a(Au-PeEL)EBL3338688 035 $a(CaPaEBR)ebr10185594 035 $a(CaONFJC)MIL209626 035 $a(OCoLC)939263700 035 $a(MiAaPQ)EBC3338688 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/78482 035 $a(ScCtBLL)da8aa3d0-650b-46a4-8d09-e4aec31d283c 035 $a(OCoLC)994046661 035 $a(oapen)doab78482 035 $a(EXLCZ)992670000000544767 100 $a19971003d2007 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy on the line $ethe politics of wiretapping and encryption /$fWhitfield Diffie, Susan Landau 205 $aUpdated and expanded ed. 210 $aCambridge, MA $cMIT Press$d2007 215 $a1 online resource (496 p.) 225 1 $aThe MIT Press 300 $aDescription based upon print version of record. 311 08$a9780262042406 311 08$a0262042401 311 08$a9780262514002 311 08$a0262514001 320 $aIncludes bibliographical references and index. 327 $aCryptography -- Cryptography and public policy -- National security -- Law enforcement -- Privacy : protections and threats -- Wiretapping -- Communications in the 1990s -- Cryptography in the 1990s -- And then it all changed -- Apres le deluge. 330 $aTelecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy. 606 $aWiretapping$zUnited States 606 $aData encryption (Computer science)$xLaw and legislation$zUnited States 606 $aPrivacy, Right of$zUnited States 615 0$aWiretapping 615 0$aData encryption (Computer science)$xLaw and legislation 615 0$aPrivacy, Right of 676 $a342.73/0858 700 $aDiffie$b Whitfield$0994611 701 $aLandau$b Susan Eva$0850520 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910260644203321 996 $aPrivacy on the line$92277707 997 $aUNINA