This handbook on information security was originally published for businesses in 1989.The book's ...
In 1907, then-Major-General Sir David Henderson, wrote this watershed military text on reconnaiss...
There is little doubt that cyber-space has become the battle space for confrontations. However, t...
There is little doubt that cyber-space has become the battle space for confrontations. However, t...
'Writing a Criminal Justice Thesis' will help you understand the principles and practices associa...
Benjamin Franklin once said, 'Three may keep a secret if two of them are dead.'There is some trut...
Surveillance is the monitoring of people-what they do, how they do it, where they do it, and with...
If intelligence is information that has undergone an analytic process, then open-source intellige...
Other than classified publications, this technical monograph is perhaps the only text that addres...
Whether you are travelling abroad, living in troubled lands, you are the potential target of crim...
Intelligence operations that used secret radio methods did not end when the Berlin Wall fell.They...
Industrial espionage involves the theft or unauthorized access of proprietary information, strate...
In 'The Bazaar of Bad Dreams' (Scribner's, 2015), Stephen King wrote that just because a story ha...
In this well-researched technical monograph, the mysterious domain of 'Secret Police' is explaine...
Dive into the captivating world of intelligence analysis with 'Espionage Black Book Ten: Foundati...
What is terrorism? How do terrorists operate - what are their means, targets, and motivations? Ho...
How to Undertake Surveillance and Reconnaissance offers you a systemic way to learn about these f...
'Intelligence' is a word that conjures assorted notions of spying and espionage, secrets, and the...
Dozens of illustrations, tables of terrorist data, a name and pseudonym index, lists of bookselle...