Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
28,192
result(s) for
"Hijacking"
Sort by:
Captured at sea : piracy and protection in the Indian Ocean
\"How is it possible for six men to take a Liberian-flagged oil tanker hostage and negotiate a huge pay out for the return of its crew and 2.2 million barrels of crude oil? In his gripping new book, Jatin Dua answers this question by exploring the unprecedented upsurge in maritime piracy off the coast of Somalia in the twenty-first century. Taking the reader inside pirate communities in Somalia, onboard multinational container ships, and within insurance offices in London, Dua connects modern day pirates to longer histories of trade and disputes over protection. In our increasingly technological world, maritime piracy represents not only an interruption, but an attempt to insert oneself within the world of oceanic trade. Captured at Sea moves beyond the binaries of legal and illegal to illustrate how the seas continue to be key sites of global regulation, connectivity, and commerce today\"--Provided by publisher.
Hostage : a novel
\"Shortly after a crowded New York-bound Boeing 747 takes off from Stockholm, a bomb threat is found in one of the aircraft's lavatories. The demands are directed at both the Swedish and US governments. Police superintendent Alex Recht teams up with the energetic and often abrasive Eden Lundell from the security service's counter-terrorism unit to deal with the hijacking. Fredrika Bergman, who is currently working at the Justice Department, returns to the police force to act as a liaison between the government and the police\"--Page 4 of cover.
The International Response to Somali Piracy
by
Nederlands Instituut voor Internationale Betrekkingen "Clingendael"
,
Putten, Frans-Paul van der
,
Ginkel, Bibi van
in
21st century
,
EU-Staaten
,
Fragile Staaten/Gescheiterte Staaten
2010
The recent surge in piracy attacks off the coast of Somalia has triggered an international response which is unprecedented in terms of the number of actors involved.The International Response to Somali Piracy presents a comprehensive treatment of the international response to Somali piracy, exploring current initiatives to counter the piracy.
Computational analysis of delivery targets and trafficking at the blood‐brain barrier: toward the design of brain‐penetrant therapeutics for Alzheimer's disease
2025
Background One approach to brain delivery relies on receptor‐mediated transcytosis (RMT). Multi‐organ atlases allow searching for RMT targets by comparing brain capillary endothelial cells (BCEC) with biodistribution‐relevant peripheral cells. I sought to create a proteomics atlas of these cells. I also analyzed protein turnover, deeming it crucial for all targets and especially those that do not transport large ligands natively and whose use in RMT may thus rely on hijacking their recycling. I then hypothesized that for targets with slow internalization, one could induce endocytosis by binding extracellular regions where conformational changes would expose possibly inactive endocytic motifs in the cytosolic tails, and sought to identify targets suitable for such triggered endocytosis and to design constructs enabling it. Finally, I reasoned that after intracellular dissociation, binding endosomal proteins may be the only way to enable faster‐than‐diffusional cargo movement, ideally abluminal, and sought to identify proteins that could intercept cargo in the endosome. Method To create atlases, I processed the spectra of cell type‐resolved proteomics datasets and supplemented this with a transcriptomics‐based analysis. To analyze isoforms, I used peptide‐level proteomics, long‐read transcriptomics, and short‐read transcriptomics data with sufficient depth. To analyze turnover and trafficking, but also identify intracellular targets that could intercept cargo in the endosome, I used in vivo proteomics data and in vitro protein‐protein interactions and organelle fractionation datasets. To design endocytosis‐triggering constructs, I mined targets for conserved cytosolic endocytic motifs, then built allostery maps to locate suitable extracellular regions, and finally modeled binders targeting those regions. Result Despite shallower coverage and integration challenges, the proteomics atlas allows target identification, with some deviations from transcriptomics results. Turnover data can inform target choice. Isoforms of several hits increase their specificity to BCEC or, conversely, may complicate their use. Several targets are parts of heterodimers; targeting their interface could improve specificity. The constructs designed to trigger endocytosis show high confidence scores yet require validation. Analysis of protein‐protein interactions and subcellular fractionation helps predict endosomal targets that could intercept constructs and, unlike surface proteins, would ideally be bound at acidic pH. Conclusion These results may inform target selection and help refine constructs for better trans‐BBB delivery.
Journal Article
Investigating the D.B. Cooper hijacking
by
Streissguth, Thomas, 1958- author
in
Cooper, D. B. Juvenile literature.
,
Cooper, D. B.
,
Hijacking of aircraft United States Case studies Juvenile literature.
2020
Discusses the D.B. Cooper hijacking including what happened, Cooper's chances of survival, and different suspects in the case.
Realization of GPS Dynamic Hijacking Based on Software Radio
2021
GPS positioning technology has a wide range of use scenarios, but due to the known characteristics of GPS signal open reception and modulation methods, many solutions can easily deceive GPS signals. Once this technology is abused in violation of regulations, it may cause major safety and property losses. In order to better study the anti-hijacking technology of PGS signals, this article starts with the generative dynamic hijacking of PGS, gives the implementation method based on software radio, and further learns the code phase and dopper between asynchronous hijacking and synchronous hijacking through software radio. The compensation calculation method of Leer frequency shift parameters, and verified the effect of the software radio’s GPS dynamic hijacking implementation method through examples, and provide theoretical support for the design and improvement of future anti-hijacking systems.
Journal Article
The Penguin's crime wave
by
Sutton, Laurie
,
Vecchio, Luciano, ill
in
Batman (Fictitious character) Juvenile fiction.
,
Superheroes Juvenile fiction.
,
Supervillains Juvenile fiction.
2013
The Penguin hijacks a luxury yacht with his penguin-shaped submarine and it is up to Batman to stop him and rescue the passengers and crew.
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
2022
The recent digital revolution led robots to become integrated more than ever into different domains such as agricultural, medical, industrial, military, police (law enforcement), and logistics. Robots are devoted to serve, facilitate, and enhance the human life. However, many incidents have been occurring, leading to serious injuries and devastating impacts such as the unnecessary loss of human lives. Unintended accidents will always take place, but the ones caused by malicious attacks represent a very challenging issue. This includes maliciously hijacking and controlling robots and causing serious economic and financial losses. This paper reviews the main security vulnerabilities, threats, risks, and their impacts, and the main security attacks within the robotics domain. In this context, different approaches and recommendations are presented in order to enhance and improve the security level of robotic systems such as multi-factor device/user authentication schemes, in addition to multi-factor cryptographic algorithms. We also review the recently presented security solutions for robotic systems.
Journal Article