Showing 201 - 220 results of 552 for search '"espionage"', query time: 0.12s Refine Results
  1. 201

    Digital Dissidents / Journeyman Pictures (Firm).

    Published 2015
    Table of Contents:
    Streaming video (Wentworth users only)
    Electronic Video
  2. 202

    Textiles: Birth of An American Industry / A&E Networks (Firm).

    Published 1997
    Table of Contents:
    Streaming video (Wentworth users only)
    Electronic Video
  3. 203
  4. 204
  5. 205

    F. Scott Fitzgerald : new perspectives / edited by Jackson R. Bryer, Alan Margolies, and Ruth Prigozy.

    Published 2000
    Table of Contents: “…A dark ill-lighted place: Fitzgerald and Hemingway, Philippe Count of Darkness and Philip counter-espionage agent /…”
    Full text (Wentworth users only)
    Electronic Conference Proceeding eBook
  6. 206

    Cyberspace and international relations : theory, prospects and challenges / Jan-Frederik Kremer, Benedikt Müller, editors.

    Published 2014
    Table of Contents: “…How the 2010 Attack on Google Changed the US Government's Threat Perception of Economic Cyber Espionage /…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 207

    The Snowden reader / edited by David P. Fidler ; foreword by Sumit Ganguly. by Fidler, David P.

    Published 2015
    Table of Contents: “…Statement on Allegations of Economic Espionage /…”
    Full text (Wentworth users only)
    Electronic eBook
  8. 208

    Fragile Spaces : Forays into Jewish Memory, European History and Complex Identities / Steven E. Aschheim. by Aschheim, Steven E.

    Published 2018
    Table of Contents: “…Islamic Jihad, Zionism, and Espionage in the Great War --…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 209

    Voltaire and the Century of Light. by Aldridge, Alfred Owen

    Published 2015
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  10. 210

    It's all a game : the history of board games from Monopoly to Settlers of Catan / Tristan Donovan. by Donovan, Tristan

    Published 2017
    Table of Contents: “…I Spy: how chess and Monopoly became tools of espionage and propaganda --…”
    Book
  11. 211

    Hitchcock's motifs / Michael Walker. by Walker, Michael

    Published 2005
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  12. 212

    Corporate fraud and internal control : a framework for prevention / Richard E. Cascarino. by Cascarino, Richard

    Published 2013
    Table of Contents:
    Full text (Wentworth users only)
    Electronic eBook
  13. 213

    Introduction to Executive Protection / by Dale L June. by June, Dale L.

    Published 2004
    Table of Contents: “…--Legal Considerations--Public Agencies and Private Enterprise--The Differences--Similarities--Legal Consequences--Carrying a Concealed Weapon--Use of Force--Self-Defense--Requirements, Character, and Conduct--Requirements of an Executive Protection Specialist (Protective Agent)--Personal Characteristics--Professional Conduct--Protective Agent Equipment--Weapon--Carrying a Concealed Weapon --Shotguns and Other Weapons--Personal Body Armor--Personal Conduct (Protectee Protocol)--Working with the Press (Media Relations)--Working with the Host Committee--Working the Principal--Working Close Proximity--Deceptive Tactics--Working a Principal in a Crowd--Know the Protectee--Protective Team (Singular)--Security Posts--The Checkpoint--Surveillance Post--Surveillance Post General Instructions--Specialty Posts--At Home and Away--Estate Security--Planning--Physical and Psychological Barriers--Technological Systems--The Residential Building--Procedures--People--Office Security--Access Control--Corporate Secrets, Industrial Espionage, and Theft --Computer Security--Security Awareness--Safety--Safety Consciousness --Natural and Man-Made Disasters--Emergency Operations Plan--The Car and Driving--The Follow Up--Vehicle Security--Terrorism!…”
    Full text (WIT users only)
    Electronic eBook
  14. 214
  15. 215

    Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor.

    Published 2006
    Table of Contents: “…An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention.…”
    Full text (Wentworth users only)
    Electronic eBook
  16. 216

    Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor.

    Published 2006
    Table of Contents: “…An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention.…”
    Full text (Wentworth users only)
    Electronic eBook
  17. 217

    Cybersecurity in Humanities and Social Sciences A Research Methods Approach. by Loiseau, Hugo

    Published 2020
    Table of Contents: “…The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage…”
    Full text (Wentworth users only)
    Electronic eBook
  18. 218

    Cybersecurity in Humanities and Social Sciences A Research Methods Approach. by Loiseau, Hugo

    Published 2020
    Table of Contents: “…The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage…”
    Full text (Wentworth users only)
    Electronic eBook
  19. 219

    Cybersecurity in Humanities and Social Sciences A Research Methods Approach. by Loiseau, Hugo

    Published 2020
    Table of Contents: “…The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage…”
    Full text (Wentworth users only)
    Electronic eBook
  20. 220

    Cyber war will not take place / Thomas Rid. by Rid, Thomas, 1975-

    Published 2013
    Table of Contents: “…-- Violence -- Cyber weapons -- Sabotage -- Espionage -- Subversion -- Attribution -- Beyond cyber war.…”
    Full text (Wentworth users only)
    Electronic eBook