Listing 1 - 6 of 6 |
Sort by
|
Choose an application
"Constance étant oisive, on va lui trouver de quoi s'occuper. Des bords de Seine aux rives de la mer Jaune, en passant par les fins fonds de la Creuse, rien ne devrait l'empêcher d'accomplir sa mission. Seul problème : le personnel chargé de son encadrement n'est pas toujours très bien organisé"--Page 4 of cover.
Spy stories, French --- Spy stories --- Cloak and dagger fiction --- Espionage --- Espionage stories --- Spies --- Spy fiction --- Spy novels --- Spy thrillers (Fiction) --- Thrillers, Spy (Fiction) --- Fiction --- French spy stories --- French fiction
Choose an application
Crime in literature --- Detective and mystery stories, American --- Detective and mystery stories, English --- Fiction --- Spy stories --- Criminalité dans la littérature --- Roman policier américain --- Roman policier anglais --- Roman --- Roman d'espionnage --- History and criticism --- Authorship --- Histoire et critique --- Art d'écrire --- Criminalité dans la littérature --- Roman policier américain --- Art d'écrire --- Espionage in literature --- Popular literature --- Spies in literature --- Suspense fiction --- Suspense tales --- Tales, Suspense --- Thrillers (Fiction) --- Cloak and dagger fiction --- Espionage --- Espionage stories --- Spies --- Spy fiction --- Spy novels --- Spy thrillers (Fiction) --- Thrillers, Spy (Fiction) --- History and criticism.
Choose an application
World War, 1914-1918 --- English fiction --- -General Strike, Great Britain, 1926, in literature --- Politics in literature --- Spy stories --- -Literature and the war --- History and criticism --- -World War, 1914-1918 --- -European War, 1914-1918 --- First World War, 1914-1918 --- Great War, 1914-1918 --- World War 1, 1914-1918 --- World War I, 1914-1918 --- World War One, 1914-1918 --- WW I (World War, 1914-1918) --- WWI (World War, 1914-1918) --- History, Modern --- Cloak and dagger fiction --- Espionage --- Espionage stories --- Spies --- Spy fiction --- Spy novels --- Spy thrillers (Fiction) --- Thrillers, Spy (Fiction) --- Fiction --- Political science in literature --- English literature --- Literature and the war --- Espionage in literature. --- General Strike, Great Britain, 1926, in literature. --- Politics in literature. --- Spies in literature. --- History and criticism. --- Literature and the war. --- -History and criticism --- Espionage in literature --- General Strike, Great Britain, 1926, in literature --- Spies in literature --- World War, 1914-1918 - Literature and the war --- English fiction - - History and criticism - 20th century --- Spy stories - - History and criticism --- -English fiction
Choose an application
Comparative literature --- Thematology --- Film --- 343.9 --- 791.43-23 --- 82-312.4 --- Crime in literature --- -Detective and mystery films --- -Detective and mystery stories --- -Spy films --- Spy stories --- -Cloak and dagger fiction --- Espionage --- Espionage stories --- Spies --- Spy fiction --- Spy novels --- Spy thrillers (Fiction) --- Thrillers, Spy (Fiction) --- Fiction --- Cloak and dagger films --- Espionage films --- Secret agent films --- Secret service films --- Motion pictures --- Crime --- Detective and mystery fiction --- Detective and mystery stories --- Detectives --- Mystery stories --- Crime films --- Police films --- Criminologie --(algemeen) --- Melodramatische films. Thrillers --- Detectiveroman. Misdaadroman --- Indexes --- History and criticism --- -Indexes. --- -Indexes --- Detective and mystery films --- Espionage in literature --- Spies in literature --- Spy films --- Suspense fiction --- Thrillers (Motion pictures) --- -Criminologie --(algemeen) --- 82-312.4 Detectiveroman. Misdaadroman --- 791.43-23 Melodramatische films. Thrillers --- 343.9 Criminologie --(algemeen) --- -82-312.4 Detectiveroman. Misdaadroman --- Cloak and dagger fiction --- Film thrillers --- Movie thrillers --- Psycho thrillers (Motion pictures) --- Psychological thrillers (Motion pictures) --- Psychothrillers (Motion pictures) --- Suspense films --- Thriller films --- Thriller movies --- Thrillers (Motion pictures, television, etc.) --- Suspense tales --- Tales, Suspense --- Thrillers (Fiction)
Choose an application
popular culture --- criticism --- spy fiction --- Fleming, Ian, --- Bond, James --- Characters --- James Bond --- 007 --- ジェームズ・ボンド --- ボンド, ジェームズ --- Jēmuzu Bondo --- Bondo, Jēmuzu --- Бонд, Джеймс --- Bond, Dzheĭms --- Бонд, Џејмс --- Bond, Džejms --- بوند، جيمس --- Būnd, Jīms --- Bond, Ceyms --- Agent 007 --- Бонд, Джэймс --- Μποντ, Τζέιμς --- Bont, Tzeims --- 제임스 본드 --- 본드, 제임스 --- Jeimsŭ Bondŭ --- Bondŭ, Jeimsŭ --- Cheimsŭ Bondŭ --- Bondŭ, Cheimsŭ --- בונד, ג'יימס --- Bond, G'aims --- Bond, Iacobus --- Bonds, Džeimss --- Bondas, Džeimsas --- 占士邦 --- 邦, 占士 --- Zhanshi Bang --- Bang, Zhanshi --- 詹姆士·龐德 --- 龐德, 詹姆士 --- Zhanmushi Pangde --- Pangde, Zhanmushi --- Fu-lai-ming, Ai-an, --- Fleming, Ĭen L., --- Fleming, Yan, --- פלמינג, יאן --- Fleming, Ian Lancaster, --- Bondŭ, Cheims --- Bondŭ, Jeims --- Cheimsŭ Bond --- Jeimsŭ Bond --- Filimīng, Yān, --- فلمينگ، يان --- Fleming, Ian --- Fu-lai-ming, Ai-an --- Fleming, Ĭen L. --- Fleming, Yan --- Fleming, Ian Lancaster --- English Literature --- Characters and characteristics. --- Characteristics, Personal --- Personal characteristics --- Persons --- Typology (Psychology) --- Fleming, I︠A︡n --- Fleming, I͡An
Choose an application
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America
Listing 1 - 6 of 6 |
Sort by
|