This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can... This description may be from another edition of this product.
Related Subjects
Business Business & Finance Business & Investing Business & Management Computer Science Computers Computers & Technology Culture Encryption Engineering Hacking Industries & Professions Information Management Internet, Groupware, & Telecommunications Manager's Guides to Computing Network Security Networking Security & Encryption Textbooks