First Page | Document Content | |
---|---|---|
![]() Date: 2005-08-11 13:01:12Bletchley Park Lorenz cipher Cipher Colossus computer Code Classical cipher M-209 Cryptography Espionage Cyberwarfare | Add to Reading List |
![]() | r Secret Code Machines: The Inside Story The Eerie World of Espionage Ho,s Created Some Truly Strange Hsrdwsre!DocID: 1xTmM - View Document |
![]() | “Surveillance art” reassures us: It is better to be a little paranoid Like the creators of the “Conversnitch” project, the artists of “surveillance art”1 invite us to drive out the finks and other espionage tDocID: 1vfwl - View Document |
![]() | Susanne Knickmeier & Elisa Wallwaey Statistical Overview and First Findings of a Case Analysis of Industrial Espionage in GermanyDocID: 1v3WJ - View Document |
![]() | Elisa Wallwaey Economic and Industrial Espionage in German SMEs OverviewDocID: 1uYr5 - View Document |
![]() | An Exceptional Espionage Operation Tolkachev, A Worthy Successor aDocID: 1uWy5 - View Document |