Espionage

Results: 3893



#Item
181Military terminology / Signals intelligence / Unmanned aerial vehicle / Drone / Surveillance / Espionage / Security / National security

What if your shopping were delivered by drones? With the proliferation of drones and their capacity to increase the efficiency and precision of multiple tasks, in what ways could they become a driving force for the Europ

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-06-03 15:15:33
182Steganography / Steganalysis / Digital watermarking / JPEG / Jessica Fridrich / Quantization / Vector space / Feature / Steganography tools / Cryptography / Algebra / Espionage

On Completeness of Feature Spaces in Blind Steganalysis Jan Kodovský Jessica Fridrich SUNY Binghamton

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2008-09-02 10:01:57
183Information / Web 2.0 / Computer law / Proprietary software / Copyright / Spyware / Royalties / User / Anti-spam techniques / Espionage / Computing / Intellectual property law

DropThought, Inc. Terms of Service Last Updated: July 7, Introduction; Your Agreement to these Terms of Service. a. DropThought, Inc. ("DropThought") provides instant feedback tools that enable, among other thing

Add to Reading List

Source URL: dt-sdocus.s3-us-west-1.amazonaws.com

Language: English - Date: 2014-07-18 20:37:48
184Steganalysis / JPEG / Image noise / Jessica Fridrich / Steganographic file system / Cryptography / Steganography / Espionage

The Square Root Law of Steganographic Capacity Andrew D. Ker Tomáš Pevný Oxford University Computing Laboratory

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2008-06-09 14:47:20
185Internet / Espionage / Privacy / Internet ethics / Identity management / Anonymity / Encryption / Secure communication / Tor / Ethics / Internet privacy / Human rights

Advance Edited Version A/HRCDistr.: General 22 May 2015

Add to Reading List

Source URL: m.contexte.com

Language: English - Date: 2015-05-28 10:10:34
186Espionage / Intelligence assessment / Military intelligence / United States / National security / Military personnel / W. Patrick Lang / Cyberwarfare

THE byBUTCHER’S CLEAVER W. Patrick Lang As close to a time machine as we can now achieve  –James P. Peak A thrilling novel of Civil War

Add to Reading List

Source URL: turcopolier.typepad.com

Language: English - Date: 2011-05-16 16:49:05
187Mathematics / Graphics file formats / Steganalysis / Computer file formats / JPEG / Digital watermarking / Jessica Fridrich / Embedding / Quantization / Cryptography / Espionage / Steganography

Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities Jessica Fridrich Tomáš Pevný

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2007-08-27 16:39:05
188Intelligence / Military intelligence / Cyberwarfare / Double agent / KGB / Counterintelligence / Central Intelligence Agency / Foreign Intelligence Service / Mole / Espionage / National security / Data collection

GLOSSARY OF TERMS LANGUAGE OF ESPIONAGE The shadow world has inspired — and mandated — a vivid vocabulary of words and codenames for secret operations, missions and agents. These words are carefully chosen to clarify

Add to Reading List

Source URL: www.powerhousemuseum.com

Language: English - Date: 2012-10-22 00:33:31
189Crime prevention / Law enforcement / Surveillance / Unmanned aerial vehicle / Nevada / Workplace surveillance / Drone / National security / Security / Espionage

  December 2014, CCJPNevada vs. U.S. Residents’ Attitudes Toward Surveillance Using Aerial Drones By Mari Sakiyama, M.A., Terance D. Miethe, Ph.D., Joel D. Lieberman, Ph.D., and Miliaikeala S.J. Heen, M.A.

Add to Reading List

Source URL: www.unlv.edu

Language: English - Date: 2015-01-27 19:17:17
190National security / United States government secrecy / Espionage / Security clearance / Background check / Credential / Contractor screening / E-Verify / Huntington Ingalls Industries / Security / Government / Cryptography

159385Newport News SHIPBUILDING NON-EMPLOYEE ACCESS BADGE Request this form is considered Personal Identifiable information (PII) WHEN completed and shall be Controlled as, HUNTINGtON INGALLS INDUSTRIES PROPRIETA

Add to Reading List

Source URL: supplier.huntingtoningalls.com

Language: English - Date: 2013-09-16 10:39:20
UPDATE