-
1
The case of the «Volga Espionage Organization». 1919
Published 2023-12-01Subjects: Get full text
Article -
2
-
3
The Billion Dollar Spy : a true story of Cold War espionage and betrayal /
Published 2015“…a true story of Cold War espionage and betrayal /…”
View in OPAC
Book -
4
Film music and construction of tourist imaginaries in Hollywood blockbusters
Published 2023-07-01Subjects: Get full text
Article -
5
The organisational structure of the economic security service of the enterprise and the main functions of its divisions
Published 2022-07-01Subjects: Get full text
Article -
6
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. …”
Get full text
Article -
7
The Issues of the Sixth Dalai Lama and the Transformation of Qing Information System on Tibet
Published 2024-12-01“…By establishing a new system of espionage operated by a eunuch lama serving in the imperial court, the Qing finally deposed the Sixth Dalai Lama and secretly murdered him in 1706. …”
Get full text
Article -
8
Approaches to cyber weapons classification problem
Published 2013-04-01“…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
Get full text
Article -
9
Fooling the mind: An approach on attention and concentration based on deceptions
Published 2025-02-01“…The manual teaches field agents tricks, based on those used by magicians, for espionage purposes, such as object manipulation and covert communication. …”
Get full text
Article -
10
Computer Network Attacks and Modern International Law
Published 2014-04-01“…Computer network attacks (CNA) is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. …”
Get full text
Article