Showing 1 - 10 results of 10 for search '"espionage"', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3

    The Billion Dollar Spy : a true story of Cold War espionage and betrayal / by Hoffman, David E.

    Published 2015
    “…a true story of Cold War espionage and betrayal /…”
    View in OPAC
    Book
  4. 4
  5. 5
  6. 6

    The Strategic Measures for the Industrial Security of Small and Medium Business by Chang-Moo Lee

    Published 2014-01-01
    “…The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. …”
    Get full text
    Article
  7. 7

    The Issues of the Sixth Dalai Lama and the Transformation of Qing Information System on Tibet by Ling-Wei Kung

    Published 2024-12-01
    “…By establishing a new system of espionage operated by a eunuch lama serving in the imperial court, the Qing finally deposed the Sixth Dalai Lama and secretly murdered him in 1706. …”
    Get full text
    Article
  8. 8

    Approaches to cyber weapons classification problem by V. V. Kabernik

    Published 2013-04-01
    “…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
    Get full text
    Article
  9. 9

    Fooling the mind: An approach on attention and concentration based on deceptions by Rafael G. Lenzi

    Published 2025-02-01
    “…The manual teaches field agents tricks, based on those used by magicians, for espionage purposes, such as object manipulation and covert communication. …”
    Get full text
    Article
  10. 10

    Computer Network Attacks and Modern International Law by A. L. Kozik

    Published 2014-04-01
    “…Computer network attacks (CNA) is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. …”
    Get full text
    Article