Listing 1 - 9 of 9 |
Sort by
|
Choose an application
A history of Swedish interception of radio and telegraph messages during World Wars I and II providing a valuable background to Swedish military operations at this time. This should prove a valuable work for anyone interested in the intelligence systems at work during wartime.
Electronic intelligence --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- History
Choose an application
Electronic surveillance. --- Electronic intelligence. --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing
Choose an application
Navy analysts are struggling to keep pace with the growing flood of data collected by intelligence, surveillance, and reconnaissance sensors. This challenge is sure to intensify as the Navy continues to field new and additional sensors. The authors explore options for solving the Navy's "big data" challenge, considering changes across four dimensions: people, tools and technology, data and data architectures, and demand and demand management.
Electronic intelligence -- United States. --- Electronic intelligence. --- United States. -- Navy. --- Military & Naval Science --- Law, Politics & Government --- Military Administration --- Electronic intelligence --- United States. --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- U.S. Navy --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- E-books
Choose an application
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ
Electronic intelligence. --- Internet in espionage. --- Cyber intelligence (Computer security) --- Internet --- Computer crimes. --- Security measures. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Espionage --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures
Choose an application
Polemology --- inlichtingendiensten --- New Zealand --- Intelligence service --- Electronic intelligence. --- Service des renseignements --- Renseignement électronique --- International cooperation --- Coopération internationale --- New Zealand. --- 327.84 <73> --- 327.84 <931> --- Renseignement électronique --- Coopération internationale --- Electronic intelligence --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- GCSB --- Government Communications Security Bureau (N.Z.) --- Public administration --- Research --- Disinformation --- Secret service --- Electronic surveillance --- Military intelligence --- Electronic countermeasures --- GEOINT New Zealand
Choose an application
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.
Wiretapping --- Data encryption (Computer science) --- Privacy, Right of --- Law and legislation --- Electronic intelligence --- Electronic surveillance --- Telecommunication --- Political aspects --- INFORMATION SCIENCE/Communications & Telecommunications --- INFORMATION SCIENCE/Technology & Policy --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Intelligence service --- Military intelligence --- Electronic countermeasures --- Human rights, civil rights --- Communications engineering / telecommunications
Choose an application
Atteinte à la vie privée --- Droit au respect de la vie privée --- Droit à l'intimité --- Electronic intelligence --- Electronic social networks --- Electronics in surveillance --- Elektronisch toezicht --- Elektronische berichten --- Elektronische bewaking --- Intelligence [Electronic ] --- Internetgemeenschap --- Intimité [Droit à l' ] --- Liberté de la vie privée --- Online gemeenschap --- Online sociale netwerken --- Persoonlijke levenssfeer [Recht op ] --- Privacy [Recht op ] --- Privacy [Right of ] --- Privacy [Right of ] -- Law and legislation --- Privésfeer [Recht op ] --- Renseignement électronique --- Respect de la vie privée --- Réseaux sociaux (Informatique) --- Réseaux sociaux sur Internet --- Sociaalnetwerksite --- Social networking Web sites --- Sociale netwerksite --- Surveillance [Electronic ] --- Surveillance électronique --- Vie privée [Droit à la ] --- #SBIB:309H1730 --- Electronic intelligence. --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic countermeasures --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- User-generated content --- Artificiële Intelligentie, knowledge engineering, ... --- Electronic surveillance --- Internet --- Online social networks --- Privacy, Right of --- Social media --- #SBIB:309H103 --- User-generated media --- Communication --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Social networks --- Sociotechnical systems --- Web sites --- Remote sensing --- Intelligence service --- Military intelligence --- Social aspects --- Mediatechnologie / ICT / digitale media: sociale en culturele aspecten --- Artificiële Intelligentie, knowledge engineering, .. --- Law and legislation --- Virtual communities --- Artificiële Intelligentie, knowledge engineering, . --- Artificiële Intelligentie, knowledge engineering, --- Communities, Online (Online social networks) --- Communities, Virtual (Online social networks) --- Online communities (Online social networks) --- Internet - Social aspects
Choose an application
327.5 <73> --- 973 --- Electronic intelligence --- -Cryptography --- -327.5 <73> --- 681.3*I2 --- 681.3*I2 Artificial intelligence. AI --- Artificial intelligence. AI --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- 973 Geschiedenis van de Verenigde Staten van Amerika (USA) --- Geschiedenis van de Verenigde Staten van Amerika (USA) --- 327.5 <73> Internationale conflicten. Internationale spanningen. Internationale blokvorming. Veiligheidspolitiek--Verenigde Staten van Amerika. VSA. USA --- Internationale conflicten. Internationale spanningen. Internationale blokvorming. Veiligheidspolitiek--Verenigde Staten van Amerika. VSA. USA --- History --- United States. National Security Agency --- -History --- Cryptography --- United States. --- National Security Agency --- NSA --- N.S.A. --- History. --- United States
Choose an application
Intelligent agents (Computer software) --- Remote sensing. --- Military intelligence --- Photographic interpretation (Military science) --- Video surveillance. --- Electronic intelligence. --- Research. --- Science --- Science research --- Scientific research --- Information services --- Learning and scholarship --- Methodology --- Research teams --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Electronic countermeasures --- Video recording --- Aerial photograph reading --- Photo interpretation --- Aerial photography --- Photogrammetric pictures --- Photography, Military --- Remote-sensing imagery --- Remote sensing systems --- Remote terrain sensing --- Sensing, Remote --- Terrain sensing, Remote --- Aerial photogrammetry --- Aerospace telemetry --- Detectors --- Space optics --- Information warfare --- Deception (Military science) --- Agents, Autonomous (Computer software) --- Agents, Cognitive (Computer software) --- Agents, Intelligent (Computer software) --- Assistants, Cognitive (Computer software) --- Assistants, Intelligent software --- Autonomous agents (Computer software) --- Cognitive agents (Computer software) --- Cognitive assistants (Computer software) --- IAs (Computer software) --- Intelligent agent software --- Intelligent software agents --- Intelligent software assistants --- Software agents (Computer software) --- Special agents (Computer software) --- Artificial intelligence --- Research --- Computer programs
Listing 1 - 9 of 9 |
Sort by
|