Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
28 result(s) for "Espionage Juvenile literature."
Sort by:
How to be an international spy : your top-secret guide to espionage
This top-secret guide will teach your all you need to know about the shadowy world of spies. From cool gadgets and sneaky surveillance to friendish codes and daring decoys, it's time to go undercover!
Employee Vice: Some Competing Models A Response to Moberg
Much of the current discussion of evil within business and professions locates evil within the individual employee. Dennis Moberg (1997) has argued for conceiving of employee viciousness as a lack of self-control. This paper argues, that while some evil behaviors may be well-modelled as instances of low self-control, this model does not fit much of what might qualify as evil (e.g., child-caregivers falsely accusing their fellow employees of ritual child abuse). The paper examines three alternative models of evil, two drawn from literature, one from theology, and shows why these alternative models are just as relevant for thinking about the nature and cause of evil as the low self-control model drawn from the criminology literature.
Sneaky spies : the inspiring truth behind popular stealth video games
Quietly infiltrating a high-security building to steal secret documents. Sneaking behind enemy lines to rescue an important government official ly listening to an enemy's conversation without getting caught. Fans of stealthy video games enjoy these activities and many more. But what is the true story behind today's popular stealth games? What methods to spies use to secretly gather intelligence? What kind of gear to secret agents use to spy on the activities of others? How do special forces teams achieve their missions without getting caught? Compare true spy tactics and gear to today's popular video games and learn if they are portrayed accurately, or if the games twist the truth to create a more exciting game-playing experience. The Capstone Interactive edition comes with simultaneous access for every student in your school and includes read aloud audio recorded by professional voice over artists.
Espionage
The methods and tools of espionage and anti-espionage are examined, including surveillance, bugging, spy satellites, drones, cryptography, and cyberwarfare.
Thirteenth NewsWatch
--- (Trudeau-Town Hall) (Audio: P04) Prime Minister Justin Trudeau faced a raft of questions at town hall meetings in Ontario today and one issue that came up more than once is the problems with the Phoenix pay system for government employees.
Top secret science in cybercrime and espionage
\"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This intriguing book will captivate readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security.\"-- Provided by publisher.