-
1
The case of the «Volga Espionage Organization». 1919
Published 2023-12-01Subjects: Get full text
Article -
2
-
3
The Billion Dollar Spy : a true story of Cold War espionage and betrayal /
Published 2015“…a true story of Cold War espionage and betrayal /…”
View in OPAC
Book -
4
Film music and construction of tourist imaginaries in Hollywood blockbusters
Published 2023-07-01Subjects: Get full text
Article -
5
Cold War in Space: Reconnaissance Satellites and US-Soviet Security Competition
Published 2023-07-01Subjects: Get full text
Article -
6
The organisational structure of the economic security service of the enterprise and the main functions of its divisions
Published 2022-07-01Subjects: Get full text
Article -
7
The Origins of the Spy Myth: Portrayals of Gertrude Bell in Global and Turkish Historiography
Published 2024-11-01“…It is important to note that the first association of Bell's travels with espionage in Turkish academic circles was in Semavi Eyice's 1978 article. …”
Get full text
Article -
8
Le crime d’espionnage face aux juges, d’une guerre à l’autre (France, 1914-1940)
Published 2023-03-01“…Between 1914 and 1940, the fight against espionage is undergoing major changes, firstly due to a changing context and the emergence of new threats. …”
Get full text
Article -
9
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. …”
Get full text
Article -
10
The Issues of the Sixth Dalai Lama and the Transformation of Qing Information System on Tibet
Published 2024-12-01“…By establishing a new system of espionage operated by a eunuch lama serving in the imperial court, the Qing finally deposed the Sixth Dalai Lama and secretly murdered him in 1706. …”
Get full text
Article -
11
Approaches to cyber weapons classification problem
Published 2013-04-01“…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
Get full text
Article -
12
Fooling the mind: An approach on attention and concentration based on deceptions
Published 2025-02-01“…The manual teaches field agents tricks, based on those used by magicians, for espionage purposes, such as object manipulation and covert communication. …”
Get full text
Article -
13
Фантом истории и история фантома в романе Ю. Дружникова „Первый день оставшейся жизни”
Published 2018-06-01“…Druzhnikov's nоvеl chich accumulated the features of detective, historic, аdvеnturе, аnd espionage gеnrеs. Соlliding different stylistic systems the author provokes unехресtеd synthesis which generates а work bеlоnging to а new artistic type. …”
Get full text
Article -
14
SAN: an Integrated Unmanned Air Vehicles Interdictor System Concept
Published 2017-12-01“…UAVs can be used for espionage, contraband, and the trafficking or transport of arms and hazardous materials. …”
Get full text
Article -
15
Computer Network Attacks and Modern International Law
Published 2014-04-01“…Computer network attacks (CNA) is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. …”
Get full text
Article