Espionage

Results: 3893



#Item
771Graphics file formats / Computer file formats / ISO standards / Steganalysis / JPEG / Discrete cosine transform / Niels Provos / Quantization / Wavelet / Cryptography / Espionage / Steganography

Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages,

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-07-18 20:34:18
772United States Department of Defense / Military acquisition / Counter-intelligence / Intelligence analysis / Military intelligence / Defense Intelligence Agency / Counterintelligence / United States Intelligence Community / Defense Technical Information Center / National security / Military science / Espionage

DoD Directive[removed], March 17, 2015

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2015-03-17 12:40:43
773Intelligence assessment / Espionage / Cryptography / James Rusbridger / Enigma machine

Central Bureau Intelligence Corps Association September 1994 Number 3, 1994

Add to Reading List

Source URL: www.ozatwar.com

Language: English - Date: 2014-11-19 22:29:52
774Intelligence analysis / Military intelligence / Counter-intelligence / Intelligence / Defense Intelligence Agency / Human intelligence / Counterintelligence / United States Department of Defense / National Clandestine Service / Espionage / National security / Data collection

Department of Defense INSTRUCTION NUMBER[removed]February 25, 2008 Certified Current through February 25, 2015

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2013-10-15 12:19:10
775Espionage / Malware / Raxco Software / PerfectDisk / Real-time protection / Keystroke logging / Antivirus software / Software / System software

Studio F Productions Chooses PerfectDisk to Boost Computer Performance

Add to Reading List

Source URL: www.raxco.com

Language: English - Date: 2012-07-23 16:18:55
776Area studies / Literature / Publishing / Chinese American literature / The Society for the Study of the Multi-Ethnic Literature of the United States / Simplified Chinese characters

U. S. Technology, “Chinese Espionage,” and Chinese American Communities Yuan Shu Texas Tech University Situating the increasing U.S. media exposure on “Chinese espionage” in the contexts of the U.S. pivot back to

Add to Reading List

Source URL: www.amstudy.hku.hk

Language: English - Date: 2013-05-02 06:11:20
777Queensland / Security / Military history of Australia during World War II / Military intelligence / Ultra / Royal Australian Air Force / Bletchley Park / Australian Defence Force / Central Bureau / Buckinghamshire / Australian intelligence agencies / Espionage

/ yy\ LttWxSa 5 NEWSLETTER

Add to Reading List

Source URL: www.ozatwar.com

Language: English - Date: 2014-11-19 21:16:16
778Graphics file formats / Cryptographic software / Steganalysis / Digital photography / JPEG / Palette / RGB color model / Graphics Interchange Format / Raw image format / Cryptography / Espionage / Steganography

Downloaded By: [Gulini, Amanda] At: 14:23 27 June[removed]Journal of Digital Forensic Practice, 1:47–56, 2006 Copyright © Taylor & Francis Group, LLC ISSN: [removed]print[removed]online DOI: [removed][removed]

Add to Reading List

Source URL: www.wetstonetech.com

Language: English - Date: 2010-09-02 14:43:18
779National security / Electronic warfare / Hacking / Computer crimes / Military technology / United States Cyber Command / Cyber spying / Industrial espionage / Information Warfare Monitor / Cyberwarfare / Cybercrime / Espionage

Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-03-07 12:35:38
780Enigma machine / Reflector / Cryptanalysis / Clock / Cryptanalysis of the Enigma / Plugboard / Cryptography / Espionage / Rotor machines

ENIGMA CIPHER MACHINE SIMULATOR[removed]About the Enigma Simulator The German Enigma machine is the most famous example of the battle between codemakers and codebreakers. Never before has the fate of so many lives been so

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-01-31 13:50:27
UPDATE