Title search results
Showing 1 - 20 of 47067 items
The great game: the myth and reality of espionage
By Frederick Porter Hitz. 2004
A study of how the literature of espionage compares with its actual practice, written by a former CIA officer. Hitz…
concludes that in most instances truth is more surprising and peculiar than fiction. For espionage fans interested in an insider's assessment of the reality behind the entertainment. Some strong language. 2004.The end of ownership: personal property in the digital economy (The Information Society Series)
By Aaron Perzanowski, Jason Schultz. 2016
Explores how notions of ownership have shifted in the digital marketplace, and makes an argument for the benefits of personal…
property. E-books, cloud storage, streaming, and other digital goods offer users convenience and flexibility. But consumers should be aware of the trade-offs involving user constraints, permanence, and privacy. The rights of private property are clear, but few people manage to read their end user agreements. The authors argue that introducing aspects of private property and ownership into the digital marketplace would offer both legal and economic benefits. But more importantly, it would affirm our sense of self-direction and autonomy. If we own our purchases, we are free to make whatever lawful use of them we please. Technology need not constrain our freedom; it can also empower us. 2016.The end of absence: reclaiming what we've lost in a world of constant connection
By Michael Harris. 2014
Only one generation in history (ours) will experience life both with and without the internet. For everyone who follows us,…
online life will simply be the air they breathe. Today, we revel in ubiquitous information and constant connection, rarely stopping to consider the implications for our logged-on lives. The author chronicles this massive shift, exploring what we've gained and lost in the bargain. He argues that our greatest loss has been that of absence itself -- of silence, wonder and solitude. Winner of the 2014 Governor General’s Award for Non-fiction. 2014.The digital economy: promise and peril in the age of networked intelligence
By Don Tapscott. 1996
Tapscott argues that new information technologies are creating a revolution, resulting in changes in economic and social relationships as profound…
as any ever experienced. "Internetworking" will affect business, government, and media. Using examples of business which are implementing these new systems, Tapscott presents both the promises and the perils of the new technologies. c1996.Pulitzer Prize-winning journalist investigates the life and crimes of spy Robert Hanssen, who was arrested in February 2001. Examines Hanssen's…
psychological and sexual profile and his motivations in betraying his country. Discusses the FBI's uneven performance under director Louis Freeh. Explicit descriptions of sex and some strong language. Bestseller. 2002.Taupes: infiltrations, mensonges et trahisons
By Fabrice De Pierrebourg, Vincent Larouche. 2014
" Les taupes sont la hantise des services de renseignement et des corps policiers. Certaines sont parachutées pour infiltrer un…
pays, dérober des secrets et recruter d'autres taupes. D'autres trahissent l'organisation qui les emploie et offrent leurs services à l'ennemi par vengeance, pour flatter leur ego ou par appât du gain. Leurs aventures rocambolesques fascinent ou choquent et les ravages qu'elles causent avant d'être détectées leur valent ce surnom bien mérité! De Montréal à Moscou, ces enquêtes captivantes apportent un éclairage nouveau sur des cas marquants de l'actualité canadienne, entre autres ceux de Benoît Roberge, enquêteur-vedette sur le crime organisé, Jeffrey Delisle, officier reconnu coupable d'espionnage, et Donald Heathfield et Tracey Ann Foley, le célèbre couple d' illégaux du KGB. " -- 4e de couv.More and more of our social, political and religious activities are modelling themselves after the World Wide Web. A committed…
anarchist, Vaidhyanathan shows how the key information structure of our time is the 'peer-to-peer network'. These networks have always existed - gossip is one example, as is word-of-mouth advertising - but with the rise of electronic communication, they are suddenly coming into their own. And they are drawing the outlines of a battle for information that will determine much of the culture and politics of our century. Everything from culture to terrorism and extremist politics to religion will be affected. 2005.Si les Ricains n'étaient pas là... ... nous aurions tous une vie privée (First document)
By Daniel Ichbiah, Jean-Martial Lefranc. 2014
" Si c'était un film, on aurait accusé les scénaristes d'être outrageusement irréalistes... Telle est pourtant la réalité que le…
monde a découverte le 6 juin 2013 : une surveillance d'une ampleur démesurée s'est mise en place. Elle vise à recueillir les moindres détails de nos vies : communications téléphoniques, e-mails, consultation du Web, déplacements... Enquête sur l'espionnage numérique. Comment est née la NSA, comment a-t-elle été dotée d'un pouvoir presque sans limites au lendemain du 11 septembre 2001, avec des milliards de dollars à l'appui ? Comment Edward Snowden a-t-il réussi ? un véritable thriller ? à extraire des milliers de documents afin d'exposer ce que nos gouvernants cherchaient à nous cacher, et de poser cette question : est-ce là le monde où nous désirons voir nos enfants grandir ? Ce livre expose une réalité qui dépasse la science-fiction la plus audacieuse. Une situation dans laquelle la vie privée de chacun de nous n'existe pratiquement plus. Il se trouve aussi que ? en dépit des protestations de façade de nos dirigeants ? les agences de renseignement collaborent allègrement entre elles pour mieux pister la trace de chacun de nous. Au cas où... Comme l'a déclaré Ira Hunt, l'un des partisans de cette collecte à très grande échelle : Nous essayons de tout recueillir et de le conserver à tout jamais. Existe-t-il encore des possibilités de communiquer en toute quiétude, sans être espionné par des oreilles ou yeux indiscrets ? Oui, dans une certaine mesure, et ce livre s'attache également à décrire les moyens de défendre ce qui nous reste de vie privée. " -- 4e de couv.Drawing on long-classified documents, this is the official history of the war waged by Britain's Special Operations Executive on Benito…
Mussolini's Fascist Italy. It provides an account of SOE's clandestine efforts to strike at Italy and sever its alliance with Nazi Germany, uncovering missions as remarkable as a plot to assassinate Mussolini and plans to arm the Mafia. It also recounts SOE's attempts at causing trouble inside an enemy country as opposed to an enemy-occupied one. This is a tale of desperate daring and sacrifice, climaxing in one of the most extraordinary episodes of the war: the delicate and dramatic dealings between the Allies and the Italians that led to Italy's surrender in 1943. 2014.Surviving the information age
By Jim Carroll. 1997
Written for baby boomers and other generations who grew up before the computer revolution. Carroll explores the skepticism many feel…
towards computers and discusses how technology is changing business. He presents ideas to help people adapt to technology and what skills and attitudes we need to function in the information age. c1997.Sisterhood of spies: the women of the OSS
By Elizabeth P McIntosh. 1998
During World War II, the author, a war reporter, was recruited by the Office of Strategic Services (OSS)--later the CIA--to…
work in the propaganda division. She describes other female operatives, some of whom were spies with hair-raising duties behind enemy lines. Concludes with the role women play in intelligence, including uncovering the Soviet mole Aldrich Ames. 1998.Streampunks: YouTube and the rebels remaking media
By Robert Kyncl, Maany Peyvan. 2017
Social media 101: tactics and tips to develop your business online (Your coach in a box)
By Chris Brogan. 2010
State of war: the secret history of the CIA and the Bush administration
By James Risen. 2006
New York Times reporter recounts anecdotes, often from anonymous sources, concerning CIA efforts to thwart terrorists since September 11, 2001.…
Discusses the National Security Agency's domestic wiretapping program, the search for weapons of mass destruction, and the return of Afghanistan's opium trade. Posits that the CIA mission failed. Bestseller. 2006.Skulking for the King: a loyalist plot
By J Fraser. 1985
Shula, code name the Pearl: Code Name The Pearl
By Aviezer Golan, Danny Pinkas. 1980
Biography of the woman who was known as the Mata Hari of the Middle East. A Jerusalem-bred Beirut housewife and…
mother of seven, Shula became an important Israeli agent with access to the highest circles of power in Lebanon during the post-World War II period. c1980. Uniform title: Shem tsofen, ha-Peninah.Sidney Reilly: the true story of the world's greatest spy
By Michael Kettle. 1983
The legendary exploits of the daring, enigmatic Russian-Polish Jew born Sigmund Rosenblum, who called himself Sidney Reilly. The author shows…
that Reilly failed in his major mission for the British Secret Service of overturning the Bolshevik government and that his disclosures upon capture by the Russians facilitated Soviet infiltration of the British Secret Service. 1983.Shadrin, the spy who never came back: The Spy Who Never Came Back
By Henry Hurt. 1981
Documents the true story of a Soviet naval captain who defected to the United States, served as a double agent…
for the C.I.A., and disappeared under mysterious circumstances while on assignment in Vienna. The author believes that Shadrin may have been sacrificed as a pawn in a game for higher stakes. 1981.SEND: the essential guide to email for office and home
By David Shipley, Will Schwalbe. 2007
When should you email, and when should you call, fax, or just show up? What is the crucial - and…
most often overlooked - line in an email? What is the best strategy when you send (in anger or error) a potentially career-ending electronic bombshell? This guide shows how to write the perfect email, and also points out the numerous times when email can be the worst option and might land you in hot water (or even jail!). 2007.Red cloud at dawn: Truman, Stalin, and the end of the atomic monopoly
By Michael D Gordin. 2009
On August 29, 1949, the first Soviet test bomb, dubbed "First Lightning", exploded in the deserts of Kazakhstan. This surprising…
international event marked the beginning of an arms race that would ultimately lead to nuclear proliferation beyond the Soviet Union and the United States. Using newly opened archives, Gordin follows a trail of espionage, secrecy, deception, political brinksmanship, and technical innovation to provide a fresh understanding of the nuclear arms race. 2009.