Listing 1 - 4 of 4 |
Sort by
|
Choose an application
In this absorbing account of life with the great atomic scientist Enrico Fermi, Laura Fermi tells the story of their emigration to the United States in the 1930s-part of the widespread movement of scientists from Europe to the New World that was so important to the development of the first atomic bomb. Combining intellectual biography and social history, Laura Fermi traces her husband's career from his childhood, when he taught himself physics, through his rise in the Italian university system concurrent with the rise of fascism, to his receipt of the Nobel Prize, which offered a perfect opportunity to flee the country without arousing official suspicion, and his odyssey to the United States.
Physicists --- Fermi, Enrico, --- Fermi, Enriko, --- enrico fermi, science, immigration, refugee, intellectual migration, atomic bomb, research, technology, war, nuclear weapons, biography, autobiography, physics, fascism, government, nobel prize, defection, italy, mussolini, history, nonfiction, marriage, south america, parenting, exile, americanization, assimilation, double agent, top secret, rome, columbia, chicago, los alamos, scientist, manhattan project, iron curtain, ettore majorana, klaus fuchs, bruno montecorvo, experiments, homeland.
Choose an application
Based on his reading of top-secret files of the Israeli police and the prime minister's office, Hillel Cohen exposes the full extent of the crucial, and, until now, willfully hidden history of Palestinian collaboration with Israelis-and of the Arab resistance to it. Cohen's previous book, the highly acclaimed Army of Shadows,told how this hidden history played out from 1917 to 1948, and now, in Good Arabs he focuses on the system of collaborators established by Israel in each and every Arab community after the 1948 war. Covering a broad spectrum of attitudes and behaviors, Cohen brings together the stories of activists, mukhtars, collaborators, teachers, and sheikhs, telling how Israeli security agencies penetrated Arab communities, how they obtained collaboration, how national activists fought them, and how deeply this activity influenced daily life. When this book was first published in Hebrew, it became a bestseller and has evoked bitter memories and intense discussions among Palestinians in Israel and prompted the reclassification of many of the hundreds of documents Cohen viewed to uncover a story that continues to unfold to this day.
Minorities --- National security --- Intelligence service --- Palestinian Arabs --- Ethnic minorities --- Foreign population --- Minority groups --- Persons --- Assimilation (Sociology) --- Discrimination --- Ethnic relations --- Majorities --- Plebiscite --- Race relations --- Segregation --- Arab Palestinians --- Arabs --- Arabs in Palestine --- Palestinians --- Ethnology --- Political activity --- Israel. --- Shin Bet --- Shin Beth --- Sh. B. --- Shabak --- ישראל. --- שב״כ --- שירות הבטחון הכללי --- Israel Security Service --- ISA --- Israel --- Ethnic relations. --- Politics and government. --- 1948. --- 1967. --- 20th century. --- arab communities. --- arab resistance. --- arab world. --- arabs. --- collaborators. --- diplomacy. --- discussion books. --- dramatic. --- engaging. --- hebrew. --- hidden history. --- intense. --- israel. --- israeli arabs. --- israeli police. --- israeli security agencies. --- mukhtars. --- nonfiction. --- page turner. --- palestine and israel. --- palestinians. --- political activists. --- political. --- postwar israel. --- prime minister. --- revolution. --- sheikhs. --- teachers and students. --- top secret files. --- true story.
Choose an application
Au moment précis où, partout dans le monde, les services de renseignement se trouvent dans la ligne de tir, un important journaliste d'investigation publie un livre sur la Sûreté de l'État. L'agence gouvernementale la plus secrète du pays a bien plus à cacher que ce que nous soupçonnons ! La Sûreté de l'État ne tolère pas les fouineurs. Il n'en fallait pas plus à Lars Bové pour enquêter, durant un an, sur le monde trouble des espions et du cyberterrorisme. Jamais une image si claire n'avait été donnée de l'administration dont même nos politiciens de savent presque rien. Bové dénoue la culture du secret et fait des découvertes étonnantes. Plus que jamais, la Sûreté de l'État doit nous protéger contre les djihadistes et autres menaces terroristes, mais elle constitue en même temps une menace pour ses propres citoyens.
Sûreté de l'État --- BPB1506 --- Belgique --- Staatsveiligheid --- België --- Sûreté de l'Etat --- Secret professionnel --- Indicateurs --- Internal security --- Belgium --- Intelligence service --- Espionage --- History --- 21st century --- 20th century --- Bélgica --- Belgija --- Belgien --- Belgie --- Belgicko --- Beļģija --- Белгија --- Belgio --- Белгия --- Belgia --- il-Belġju --- An Bheilg --- Βέλγιο --- Belgjika --- Belgia Kuningriik --- Beļģijas Karaliste --- Royaume de Belgique --- Belgian kuningaskunta --- Belgické kráľovstvo --- Koninkrijk België --- Belgijos Karalystė --- das Königreich Belgien --- Βασίλειο του Βελγίου --- Kingdom of Belgium --- Кралство Белгија --- Краљевина Белгија --- Belgické království --- Reino de Bélgica --- ir-Renju tal-Belġju --- Regatul Belgiei --- Kongeriget Belgien --- Кралство Белгия --- Mbretëria e Belgjikës --- Belga Királyság --- Królestwo Belgii --- Konungariket Belgien --- Reino da Bélgica --- Kraljevina Belgija --- Regno del Belgio --- Sûreté de l'État --- secret --- mystère --- patriotisme --- MI5 --- informateurs --- l'écoute téléphonique --- politiciens --- top secret --- partis politiques --- armes --- EU --- confidentialité --- aide diplomatique --- espionnage --- yoga --- NSA --- screening --- terrorisme --- services secrets --- la Sûreté de l'Etat
Choose an application
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America
Listing 1 - 4 of 4 |
Sort by
|