Choose an application
Spies --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service --- History
Choose an application
"In Equipping James Bond, Andre Millard provides readers with a hundred-year history of espionage technology through the lens of Ian Fleming's James Bond character and the gadgets integrated into both his novels and films. This book takes a wide-ranging look at factual (as well as fictional) technology, starting with the beginning of military aviation spanning through the contemporary threat of computer hacking. Millard views the fictional James Bond universe--and its wide popularity throughout the twentieth century--as evidence for both popular Whiggish perceptions of technological development as well as the borderline apocalyptic fear of technology's potential threats. As technology developed in the twentieth century, Millard contends, so did the gadgets of the James Bond universe--Bond and his adversaries evolved alongside rapidly developing technology. According to Millard, Bond, Ian Fleming, and the global fandom of the James Bond novels and films were simultaneously enthusiastic about triumphant perceptions of growth and technology and fearful of their potential ramifications"--
Espionage --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- Technological innovations. --- Bond, James
Choose an application
The development and legal purchase of ""know-how"" are costly. Accordingly, for companies in possession of ""know-how"" it is of vital interest to ensure that competitors do not gain access to their specialized knowledge. Taking this fact into consideration, this work concentrates on a problem area that has yet to be debated in depth, namely the distinction between protected and unprotected know-how in the case of ""reverse engineering"", which is the acquiring of construction and programming knowledge by dismantling and reverse development.
Reverse engineering --- Intellectual property --- Law and legislation --- Copyright law. --- Industrial spying. --- Know-how/law. --- Patent law. --- Utility patent law.
Choose an application
Business intelligence --- Corporations --- White collar crimes --- Intelligence économique --- Entreprises --- Crimes en col blanc --- Corrupt practices --- Pratiques déloyales --- Intelligence économique --- Pratiques déloyales --- Economic Competition --- Spying
Choose an application
Choose an application
Cyber intelligence (Computer security) --- Cyberspace --- Computer networks --- Space and time --- Computers --- Telematics --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Security measures
Choose an application
The study explores "the case of national jitters" that occurred in the United States in the years 1938 to 1942 following rumours of the existence of a German Fifth Column movement. It relates how both government and citizens exaggerated what was actually a modest German effort.
Subversive activities --- Espionage --- World War, 1939-1945 --- Spies --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Secret service --- History
Choose an application
The Literary Spy provides a unique view of the intelligence world through the words of its own major figures (and those fascinated with them) from ancient times to the present. CIA speechwriter and analyst Charles E. Lathrop has compiled and annotated more than 3,000 "ations from such disparate sources as the Bible, spy novels and movies, Shakespeare's plays, declassified CIA documents, memoirs, TV talk shows, and speeches from U.S. and foreign leaders and officials. Arranged in thematic categories with opening commentary for each section, the "ations speak for themselves. Together they serve both to illuminate a world famous for its secrets and deceptions and to show the extent to which intelligence has manifested itself in literature and in life. Engaging, informative, and often irreverent, The Literary Spy is an exceedingly satisfying book-one that meets the needs of the serious researcher just as ably as those of the armchair spy in pursuit of an evening's entertainment.
Espionage --- History, Modern --- Modern history --- World history, Modern --- World history --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies
Choose an application
At the beginning of World War II, Heinz August L?ning, posing as a Jewish refugee, was sent to Cuba to spy for the Third Reich. L?ning's assignment was to collect information about the United States and its allies and report back to Abwehr, the German foreign intelligence agency. The Caribbean waters L?ning monitored were important to the Allies both for shipping and for deploying ships between the various fronts. Despite some early setbacks, L?ning provided information on naval activities to the Germans. Ultimately, however, L?ning was arrested and became the only Nazi spy executed in Lati
Spies --- Espionage, German --- World War, 1939-1945 --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service --- German espionage --- Lüning, Heinz,
Choose an application
Spies. --- Military surveillance. --- Surveillance, Military --- Detectors --- Military intelligence --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service