Suggested Topics within your search.
Suggested Topics within your search.
- History 138
- Espionage 79
- Spies 56
- Security measures 48
- Intelligence service 41
- Computer security 38
- Computer networks 36
- Secret service 29
- Computer crimes 28
- History and criticism 26
- Cold War 24
- Espionage, Soviet 20
- Political aspects 19
- Information warfare 18
- National security 18
- Prevention 18
- Cyberterrorism 17
- Foreign relations 17
- Motion pictures 17
- Cyberspace 16
- Espionage, American 16
- Military intelligence 16
- Politics and government 16
- World War, 1939-1945 16
- Social aspects 15
- Electronic surveillance 14
- Data protection 13
- Computer Security 12
- History, Modern 11
- Business enterprises 10
-
201
Digital Dissidents / Journeyman Pictures (Firm).
Published 2015Table of Contents: Streaming video (Wentworth users only)
Electronic Video -
202
Textiles: Birth of An American Industry / A&E Networks (Firm).
Published 1997Table of Contents: Streaming video (Wentworth users only)
Electronic Video -
203
The dark side of software engineering : evil on computing projects / Johann Rost and Robert L. Glass.
Published 2011Table of Contents: Full text (Wentworth users only)
Electronic eBook -
204
Look to the earth : historical archaeology and the American Civil War / edited by Clarence R. Geier, Jr. and Susan E. Winter.
Published 1994Table of Contents: Table of contents
Book -
205
F. Scott Fitzgerald : new perspectives / edited by Jackson R. Bryer, Alan Margolies, and Ruth Prigozy.
Published 2000Table of Contents: “…A dark ill-lighted place: Fitzgerald and Hemingway, Philippe Count of Darkness and Philip counter-espionage agent /…”
Full text (Wentworth users only)
Electronic Conference Proceeding eBook -
206
Cyberspace and international relations : theory, prospects and challenges / Jan-Frederik Kremer, Benedikt Müller, editors.
Published 2014Table of Contents: “…How the 2010 Attack on Google Changed the US Government's Threat Perception of Economic Cyber Espionage /…”
Full text (Wentworth users only)
Electronic eBook -
207
The Snowden reader / edited by David P. Fidler ; foreword by Sumit Ganguly.
Published 2015Table of Contents: “…Statement on Allegations of Economic Espionage /…”
Full text (Wentworth users only)
Electronic eBook -
208
Fragile Spaces : Forays into Jewish Memory, European History and Complex Identities / Steven E. Aschheim.
Published 2018Table of Contents: “…Islamic Jihad, Zionism, and Espionage in the Great War --…”
Full text (Wentworth users only)
Electronic eBook -
209
Voltaire and the Century of Light.
Published 2015Table of Contents: Full text (Wentworth users only)
Electronic eBook -
210
It's all a game : the history of board games from Monopoly to Settlers of Catan / Tristan Donovan.
Published 2017Table of Contents: “…I Spy: how chess and Monopoly became tools of espionage and propaganda --…”
Book -
211
Hitchcock's motifs / Michael Walker.
Published 2005Table of Contents: Full text (Wentworth users only)
Electronic eBook -
212
Corporate fraud and internal control : a framework for prevention / Richard E. Cascarino.
Published 2013Table of Contents: Full text (Wentworth users only)
Electronic eBook -
213
Introduction to Executive Protection / by Dale L June.
Published 2004Table of Contents: “…--Legal Considerations--Public Agencies and Private Enterprise--The Differences--Similarities--Legal Consequences--Carrying a Concealed Weapon--Use of Force--Self-Defense--Requirements, Character, and Conduct--Requirements of an Executive Protection Specialist (Protective Agent)--Personal Characteristics--Professional Conduct--Protective Agent Equipment--Weapon--Carrying a Concealed Weapon --Shotguns and Other Weapons--Personal Body Armor--Personal Conduct (Protectee Protocol)--Working with the Press (Media Relations)--Working with the Host Committee--Working the Principal--Working Close Proximity--Deceptive Tactics--Working a Principal in a Crowd--Know the Protectee--Protective Team (Singular)--Security Posts--The Checkpoint--Surveillance Post--Surveillance Post General Instructions--Specialty Posts--At Home and Away--Estate Security--Planning--Physical and Psychological Barriers--Technological Systems--The Residential Building--Procedures--People--Office Security--Access Control--Corporate Secrets, Industrial Espionage, and Theft --Computer Security--Security Awareness--Safety--Safety Consciousness --Natural and Man-Made Disasters--Emergency Operations Plan--The Car and Driving--The Follow Up--Vehicle Security--Terrorism!…”
Full text (WIT users only)
Electronic eBook -
214
The Manhattan project : the birth of the atomic bomb in the words of its creators, eyewitnesses, and historians / edited by Cynthia C. Kelly ; introduced by Richard Rhodes.
Published 2007Table of Contents: Table of contents
Contributor biographical information
Publisher description
Table of contents only
Publisher description
Book -
215
Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor.
Published 2006Table of Contents: “…An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention.…”
Full text (Wentworth users only)
Electronic eBook -
216
Combating spyware in the enterprise / Brian Baskin [and others] ; Tony Piltzecker, technical editor.
Published 2006Table of Contents: “…An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention.…”
Full text (Wentworth users only)
Electronic eBook -
217
Cybersecurity in Humanities and Social Sciences A Research Methods Approach.
Published 2020Table of Contents: “…The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage…”
Full text (Wentworth users only)
Electronic eBook -
218
Cybersecurity in Humanities and Social Sciences A Research Methods Approach.
Published 2020Table of Contents: “…The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage…”
Full text (Wentworth users only)
Electronic eBook -
219
Cybersecurity in Humanities and Social Sciences A Research Methods Approach.
Published 2020Table of Contents: “…The significance of state-sponsored cyber-espionage -- 4.5. Research themes in state-sponsored cyber-espionage…”
Full text (Wentworth users only)
Electronic eBook -
220
Cyber war will not take place / Thomas Rid.
Published 2013Table of Contents: “…-- Violence -- Cyber weapons -- Sabotage -- Espionage -- Subversion -- Attribution -- Beyond cyber war.…”
Full text (Wentworth users only)
Electronic eBook