Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Polemology --- Israel --- 355.4 <569.4> MOSSAD
Choose an application
Choose an application
le Mossad --- le Vatican --- archéologie --- roman
Choose an application
Polemology --- spionage --- Israel --- Asie --- Azië --- Buitenlandse politiek --- Politique extérieure --- 876.2 Inlichtingendienst --- 883.1 Centraal-Azië --- 355.4 <569.4> --- 327.8 <569.4> --- 929 OSTROVSKY, VICTOR --- 355.4 <569.4> MOSSAD --- 399.62 --- Israël --- Mossad --- Spionage - Geheime dienst --- 924 --- Israel geheime diensten --- geschiedenis Azië --- histoire Asie
Choose an application
Shipwrecks --- -Survival after airplane accidents, shipwrecks, etc --- 355.4 <569.4> MOSSAD --- Marine disasters --- Wrecks --- Adventure and adventurers --- Marine accidents --- Voyages and travels --- Collisions at sea --- Grenadine (Sailboat) --- Shipwreck survival --- Survival after airplane accidents, shipwrecks, etc. --- Survival
Choose an application
Intelligence officers --- Ostrovsky, Victor --- Israel. --- 355.4 <569.4> --- 355.4 <569.4> MOSSAD --- 327.8 <569.4> --- 929 OSTROVSKY, VICTOR --- Intelligence officers - Israel - Biography --- 924 --- Israël services secrets --- geschiedenis Azië --- histoire Asie
Choose an application
This biography of Ashraf Marwan provides valuable information about the Israeli intelligence community. In particular, it examines how Mossad recruits and manages agents.
Espionage, Israeli -- Egypt. --- Intelligence service -- Israel. --- Israel. Mosad le-modi?in v?e-tafk?idim meyuh?adim. --- Marwa ̄n, Ashraf, 1944-2007. --- Spies -- Egypt. --- Spies -- Israel. --- Spies --- Intelligence service --- Espionage, Israeli --- History & Archaeology --- Regions & Countries - Africa --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service --- Marwān, Ashraf, --- Israel. --- مروان، اشرف، --- Mossad --- Mosad --- Mus̄ād --- Spet︠s︡sluzhba Mossad --- ישראל. --- מדינת ישראל. --- מוסד
Choose an application
Cohen examines the struggle leading to the creation of the state of Israel, placing British evacuation of Palestine in the context of Britain's postwar weakness. The author describes the policies and character of each of the major actors in his story--Bevin. Truman. Ben-Gurion, and the Mufti of Jerusalem.Originally published in 1982.The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Palestine --- History --- 1948 Palestine war. --- Abba Eban. --- Abdullah I of Jordan. --- Allied-occupied Germany. --- American Council for Judaism. --- American Jewish Committee. --- American Zionist Movement. --- Aneurin Bevan. --- Anglo-American Committee of Inquiry. --- Arab League. --- Arab Legion. --- Arab Revolt. --- Arab citizens of Israel. --- Arabs. --- Arab–Israeli conflict. --- Arthur Balfour. --- Balfour Declaration. --- Bartley Crum. --- Beersheba. --- British Mandate for Palestine (legal instrument). --- Camille Chamoun. --- Chaim Weizmann. --- Colonial Office. --- David Ben-Gurion. --- Demobilization. --- Dov Gruner. --- Duff Cooper. --- Eliezer Kaplan. --- Emirate of Transjordan. --- General Zionists. --- Georges Bidault. --- Haganah. --- Harold Beeley. --- Harold Laski. --- Harry S. Truman. --- Hashomer Hatzair. --- Herbert Morrison. --- Homeland for the Jewish people. --- Ibn Saud. --- Imperialism. --- International recognition of Israel. --- Irgun. --- Israel. --- Israeli Declaration of Independence. --- Israeli–Palestinian conflict. --- Itzhak Ben-Zvi. --- J. C. Hurewitz. --- Jewish Agency for Israel. --- Jewish Brigade. --- Jewish Resistance Movement. --- Jewish leadership. --- Jewish lobby. --- Jewish refugees. --- Jewish religious terrorism. --- Jewish right. --- Jews. --- Jordan Valley (Middle East). --- Judea. --- Kfar Etzion. --- Kohn. --- Lehi (group). --- Mandatory Palestine. --- Marshall Plan. --- Middle East Journal. --- Middle East. --- Moscow Conference (1945). --- Mossad. --- Nablus. --- National Movement (Poland). --- Oil embargo. --- Operation Nachshon. --- Palestinian Jews. --- Palestinian government. --- Palestinian territories. --- Palestinians. --- Palmach. --- Prime Minister of Israel. --- Provisional government. --- Ramallah. --- Special rights. --- State of Palestine. --- Succession of states. --- Surrender of Japan. --- Tel Aviv. --- Treaty of Alliance (1778). --- United Arab Emirates. --- United Jewish Appeal. --- United Kingdom–United States relations. --- United Nations Partition Plan for Palestine. --- United Nations Trusteeship Council. --- United States Department of State. --- Weizmann. --- West Berlin. --- White Paper of 1939. --- World War II. --- Yishuv. --- Yom Kippur. --- Zionism. --- Zionist Organization of America.
Choose an application
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America
Listing 1 - 9 of 9 |
Sort by
|