Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
253,500 result(s) for "ESPIONAGE"
Sort by:
How to be an international spy : your top-secret guide to espionage
This top-secret guide will teach your all you need to know about the shadowy world of spies. From cool gadgets and sneaky surveillance to friendish codes and daring decoys, it's time to go undercover!
Sneaky spies : the inspiring truth behind popular stealth video games
Quietly infiltrating a high-security building to steal secret documents. Sneaking behind enemy lines to rescue an important government official ly listening to an enemy's conversation without getting caught. Fans of stealthy video games enjoy these activities and many more. But what is the true story behind today's popular stealth games? What methods to spies use to secretly gather intelligence? What kind of gear to secret agents use to spy on the activities of others? How do special forces teams achieve their missions without getting caught? Compare true spy tactics and gear to today's popular video games and learn if they are portrayed accurately, or if the games twist the truth to create a more exciting game-playing experience. The Capstone Interactive edition comes with simultaneous access for every student in your school and includes read aloud audio recorded by professional voice over artists.
Espionage and intelligence
\"For decades, spies have been a source of intrigue, often romanticized and sensationalized in popular culture. However, the reality of espionage is often very different from what is depicted in movies and books. It more often involves hacking into computers than donning disguises and traveling to glamorous exotic destinations. This volume looks at contemporary issues related to espionage and intelligence, including how they relate to the political and corporate worlds, its relationship to the rights to privacy and free speech, and the ethics of espionage. Through presenting a wide range of perspectives, this volume will help clarify the nature of espionage today and the different attitudes experts take towards it\"-- Provided by publisher.
A nők szerepe a kémkedésben a nagy háború idején, 1914–1918
Munkám során igyekszem bemutatni a nők kémkedésben betöltött szerepét a nagy háború során. Megvizsgálom néhány jelentősebb kémnő történetét és sorsuk alakulását. Szerepük kiemelten fontos volt már abban az időben is, nemzetbiztonsági szempontból, hiszen az általuk végzett tevékenység, a megszerzett információ előnyhöz juttathatta az egyik hadviselő felet a másikkal szemben. Ezért az elhárításnak is lényeges volt tudnia ezekről a személyekről és tevékenységükről.
Information Management: Strategies for Gaining a Competitive Advantage with Data
Managing information is an essential practice in IT and other industries, and there are several challenges that are to be dealt with in this process. We attempted to explain the basic concepts of computers in managing information systems. The security of the information using various safety layers is mandatory to keep trade secrets within the business realm. The role of project management in the IT industry is explained in simple terms/language. The transformation of businesses from traditional systems into contemporary systems is explained in detail. This book serves as a guide for IT managers and students across disciplines that deal with IT security.