Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
28
result(s) for
"Espionage Juvenile literature."
Sort by:
How to be an international spy : your top-secret guide to espionage
by
Briggs, Andy, 1972- author
in
Spies Juvenile literature.
,
Espionage Juvenile literature.
,
Spies.
2015
This top-secret guide will teach your all you need to know about the shadowy world of spies. From cool gadgets and sneaky surveillance to friendish codes and daring decoys, it's time to go undercover!
Employee Vice: Some Competing Models A Response to Moberg
1998
Much of the current discussion of evil within business and professions locates evil within the individual employee. Dennis Moberg (1997) has argued for conceiving of employee viciousness as a lack of self-control. This paper argues, that while some evil behaviors may be well-modelled as instances of low self-control, this model does not fit much of what might qualify as evil (e.g., child-caregivers falsely accusing their fellow employees of ritual child abuse). The paper examines three alternative models of evil, two drawn from literature, one from theology, and shows why these alternative models are just as relevant for thinking about the nature and cause of evil as the low self-control model drawn from the criminology literature.
Journal Article
Sneaky spies : the inspiring truth behind popular stealth video games
by
Troupe, Thomas Kingsley, author
in
Espionage Juvenile literature.
,
Spies Juvenile literature.
,
Espionage Computer games Juvenile literature.
2019
Quietly infiltrating a high-security building to steal secret documents. Sneaking behind enemy lines to rescue an important government official ly listening to an enemy's conversation without getting caught. Fans of stealthy video games enjoy these activities and many more. But what is the true story behind today's popular stealth games? What methods to spies use to secretly gather intelligence? What kind of gear to secret agents use to spy on the activities of others? How do special forces teams achieve their missions without getting caught? Compare true spy tactics and gear to today's popular video games and learn if they are portrayed accurately, or if the games twist the truth to create a more exciting game-playing experience. The Capstone Interactive edition comes with simultaneous access for every student in your school and includes read aloud audio recorded by professional voice over artists.
Espionage
by
Anniss, Matt, author
in
Spies Juvenile literature.
,
Intelligence service United States Juvenile literature.
,
Espionage Juvenile literature.
2014
The methods and tools of espionage and anti-espionage are examined, including surveillance, bugging, spy satellites, drones, cryptography, and cyberwarfare.
Thirteenth NewsWatch
2017
--- (Trudeau-Town Hall) (Audio: P04) Prime Minister Justin Trudeau faced a raft of questions at town hall meetings in Ontario today and one issue that came up more than once is the problems with the Phoenix pay system for government employees.
Newsletter
Top secret science in cybercrime and espionage
by
Rodger, Ellen, author
in
Computer crimes Juvenile literature.
,
Computer crimes Prevention Juvenile literature.
,
Internet in espionage Juvenile literature.
2019
\"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This intriguing book will captivate readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security.\"-- Provided by publisher.