Showing 1 - 15 results of 15 for search '"espionage"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3

    The Billion Dollar Spy : a true story of Cold War espionage and betrayal / by Hoffman, David E.

    Published 2015
    “…a true story of Cold War espionage and betrayal /…”
    View in OPAC
    Book
  4. 4
  5. 5
  6. 6
  7. 7

    The Origins of the Spy Myth: Portrayals of Gertrude Bell in Global and Turkish Historiography by Muhammed Nurullah Parlakoğlu

    Published 2024-11-01
    “…It is important to note that the first association of Bell's travels with espionage in Turkish academic circles was in Semavi Eyice's 1978 article. …”
    Get full text
    Article
  8. 8

    Le crime d’espionnage face aux juges, d’une guerre à l’autre (France, 1914-1940) by Nicolas Picard

    Published 2023-03-01
    “…Between 1914 and 1940, the fight against espionage is undergoing major changes, firstly due to a changing context and the emergence of new threats. …”
    Get full text
    Article
  9. 9

    The Strategic Measures for the Industrial Security of Small and Medium Business by Chang-Moo Lee

    Published 2014-01-01
    “…The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. …”
    Get full text
    Article
  10. 10

    The Issues of the Sixth Dalai Lama and the Transformation of Qing Information System on Tibet by Ling-Wei Kung

    Published 2024-12-01
    “…By establishing a new system of espionage operated by a eunuch lama serving in the imperial court, the Qing finally deposed the Sixth Dalai Lama and secretly murdered him in 1706. …”
    Get full text
    Article
  11. 11

    Approaches to cyber weapons classification problem by V. V. Kabernik

    Published 2013-04-01
    “…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
    Get full text
    Article
  12. 12

    Fooling the mind: An approach on attention and concentration based on deceptions by Rafael G. Lenzi

    Published 2025-02-01
    “…The manual teaches field agents tricks, based on those used by magicians, for espionage purposes, such as object manipulation and covert communication. …”
    Get full text
    Article
  13. 13

    Фантом истории и история фантома в романе Ю. Дружникова „Первый день оставшейся жизни” by Nefagina Galina

    Published 2018-06-01
    “…Druzhnikov's nоvеl chich accumulated the features of detective, historic, аdvеnturе, аnd espionage gеnrеs. Соlliding different stylistic systems the author provokes unехресtеd synthesis which generates а work bеlоnging to а new artistic type. …”
    Get full text
    Article
  14. 14

    SAN: an Integrated Unmanned Air Vehicles Interdictor System Concept by Marcin KRÓL, Wojciech KOPERSKI, Jan BŁASZCZYK, Ryszard WOŹNIAK, Paweł M. BŁASZCZYK

    Published 2017-12-01
    “…UAVs can be used for espionage, contraband, and the trafficking or transport of arms and hazardous materials. …”
    Get full text
    Article
  15. 15

    Computer Network Attacks and Modern International Law by A. L. Kozik

    Published 2014-04-01
    “…Computer network attacks (CNA) is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. …”
    Get full text
    Article