-
101
THE SECRET AGENT : A SIMPLE TALE /
Published 2000“…The novel deals with terrorism, espionage and anarchism.Verloc owns and runs a shop which sells pornographic material and contraceptives, this is a cover for his espionage, the target for the group is to blow up the Greenwich Observatory.…”
-
102
Reply to critics
Published 2023“…A normative defense of espionage and counterintelligence activities in the service of foreign policy goals must show at least two things. …”
Journal article -
103
Le reti di spionaggio e sabotaggio nazifasciste nell’Italia occupata dagli Alleati (1943-1945)
Published 2016-12-01“…The aim of this work is to describe German and Republican Fascists secret services espionage and sabotage networks, their missions and their agents who were sent to the South-Central Italy, between 1943 and 1945, with the goal of obstructing the Allied advance. …”
Get full text
Article -
104
Spie al museo
Published 2014-05-01“…There are many reasons for this fortunate marriage between museums and espionage. First of all, the fact that museums prioritize the visual experience make them a very pregnant metaphor for espionage activity, based on observation and control and on tools such as binoculars, magnifying glasses and miniature cameras. …”
Get full text
Article -
105
THE AMULET OF SAMARKAND /
Published 2004“…Attempting to steal the Amulet of Samarkand, Nathaniel finds himself in a whirlwind of magical espionage, murder, blackmail, and revolt.…”
text -
106
A Book of Sandhurst Wargames /
Published 1982“…An excellent and scholarly survey of the principles of simulated warfare, with four boardgames, including a simple game of medieval warfare during the Hundred Years War, a grand Napoleonic campaign game, a cat and mouse wargame of WWII espionage and airpower during the last days of the battleship Tirpitz, and a thoughtful examination of the psychology of battle in the form of a WWII Pacific Theater role-playing game of personal man-to-man combat.…”
-
107
Informazioni e spie negli stati sabaudi tra Seicento e Settecento: dinamiche, studi e prospettive di ricerca
Published 2023-06-01“…The article is about the espionage practice within the Sabaudian states on the eve of the 1686-1714 wars. …”
Get full text
Article -
108
Le crime d’espionnage face aux juges, d’une guerre à l’autre (France, 1914-1940)
Published 2023-03-01“…Between 1914 and 1940, the fight against espionage is undergoing major changes, firstly due to a changing context and the emergence of new threats. …”
Get full text
Article -
109
Mathematical and scientific analysis handbook /
Published 2015“…From chemistry to business, espionage and computer science, analysis has applications in almost all walks of life. …”
-
110
A cryptography primer : secrets and promises /
Published 2014“…In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. …”
-
111
LOS ALAMOS /
Published 1997“…Michael Connolly is sent to Los Alamos from Washington to make sure his death really is the result of a casual homosexual encounter and not connected with espionage. The Nazi regime may be near the end of its reign, but the new enemy of communism has created an atmosphere of paranoia as Oppenheimer and his team come ever closer to concluding the experiment. …”
text -
112
-
113
“Who the Hell Are You?”
Published 2023-12-01“…He bases the plot of his postmodern play, Hapgood (1988), on quantum theory and draws an analogy between Werner Heisenberg’s principle of indeterminism, termed “The Uncertainty Principle”, and international espionage. Thus, he constructs the complicated relationship between the particle and the whole throughout the play to depict the relativistic and deceptive relationship between sex and gender. …”
Get full text
Article -
114
Pemberdayaan Keluarga Dalam Proses Perawatan Klien Skizofrenia Melalui Pendidikan Kesehatan Di Rumah Sakit Jiwa
Published 2004“…Yet, on analysis of independent t-test, method of group espionage used folder was more effective than individual espionage method used folder for increasing knowledge. …”
Article -
115
Cooperation unavowable: British government relations with communists in Britain and France, 1938 – 1945
Published 2023“…More than thirty years on from the dissolution of the USSR, British government interaction with the Soviet Union, representatives of the Communist International (Comintern) and individual communists in the period 1938 - 1945 continues to be viewed primarily through the lens of ideological disparity and mutual suspicion, of espionage and counter-espionage. Nowhere has this been truer than in accounts of the activity of Britain’s Special Operations Executive (SOE), and its predecessor Section D, in France and the United Kingdom. …”
Thesis -
116
Cybersecurity in Humanities and Social Sciences : A Research Methods Aapproach /
Published 2020text -
117
THE RIDDLE OF SANDS /
-
118
”Korkea peli”
Published 2024-03-01“…In 1958, the Finnish security police discovered a major espionage case related to a Russian emigrant Vadim Björkelund. …”
Get full text
Article -
119
-
120
"Working Out of the Past" (Patriotic War in a Mirror of a Modern Masscult)
Published 2010-04-01“…The mass culture as a source of formation of memory of the Soviet past is considered in the article, told about the fact of leaving from the present and a source of remakes; formation of new genre skeleton of a modern fiction is investigated, thus game in «the Soviet novel» and «the espionage novel» as one of displays of the first and also engraving stories appears the most demanded.…”
Get full text
Article