Search

Your search keyword '"*CLASSIFIED defense information"' showing total 330 results

Search Constraints

Start Over You searched for: Descriptor "*CLASSIFIED defense information" Remove constraint Descriptor: "*CLASSIFIED defense information"
330 results on '"*CLASSIFIED defense information"'

Search Results

1. THE SECRET DOGFIGHT.

2. The Copenhagen School in South America: the (de)securitization of UNASUR (2008-2017).

3. Embracing the Media: Eisenhower Worked With, Not Against, the Press.

5. Russian nuclear forces, 2006.

6. Does online anonymity undermine the sense of personal responsibility?

7. Concealing Collusion: The Suez Crisis, Political Memoirs and Official Secrecy, 1956–1969 *.

8. Leaky Revelations: Commitments in Exposing Militarism.

9. An ensemble learning approach to lip-based biometric verification, with a dynamic selection of classifiers.

10. PERIODICALS AND MILITARY CENSORSHIP DURING THE FIRST WORLD WAR: MILITARY SECRETS AND THE FREEDOM OF INFORMATION PROBLEM.

11. KEEPING SECRETS.

12. Open Secret.

13. The Russian Peasant at the Front during the First World War.

14. Recovering the military Enigma using permutations—filling in the details of Rejewski's solution.

15. Nukes you can use.

16. The Russian Peasant at the Front during the First World War.

17. A BRIEF JOURNEY THROUGH FRENCH JEWISH HISTORY.

18. CAPTAIN CROMWELL'S DECISION.

20. LEAK-A-BOO.

21. How a Legal Bomb Works.

22. INFORMATION CONTROL: MAKING SECRETS AND KEEPING THEM SAFE.

23. HEURISTIKA I ZAKONSKA REGULATIVA U OBLASTI ZAŠTITE TAJNIH PODATAKA U FUNKCIJI EDUKACIJE SUBJEKATA SISTEMA ODBRANE.

24. The Long Shadow of the CIA at Guantánamo.

25. The Torture Blame Game.

26. The Civilianization of a Nuclear Weapon Effects Test: Operation ARGUS.

27. TICOM: The Last Great Secret of World War II.

28. Fragile and Provocative: Notes on Secrecy and Intelligence.

29. Letter to the Editor.

30. ARCHITECTURE PRACTICE SUPPORTING CONNECTIVITY ANALYSIS.

31. PRIVILEGE-WISE AND PATENT (AND TRADE SECRET) FOOLISH? HOW THE COURTS' MISAPPLICATION OF THE MILITARY AND STATE SECRETS PRIVILEGE VIOLATES THE CONSTITUTION AND ENDANGERS NATIONAL SECURITY.

32. A Verbal Model of the Army Command and Control Infosphere: Which Resources Are Available.

33. Transparency and Accountability in a Time of Terror: The Bush Administration's Assault on Freedom of Information.

34. The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry

35. Late September at an undisclosed location in the Nevada desert.

36. State Secrets and Executive Power.

37. Swift on False Witness.

38. 'No Wishful Thinking Allowed': Secret Service Committee and Intelligence Reform in Great Britain, 1919-23.

39. The U.S. Presidency and national security directives: An overview

40. The Navajo Code Talkers: A Secret World War II Memorandum.

41. Security Classification in Fundamental Science.

42. Responding To/Answering For: The Secret.

43. Secrets among Friends: The Research Information Service and the "Special Relationship" in Allied Scientific Information and Intelligence, 1916-1918.

44. Unnecessary Secrets.

45. Intelligence to please? The Order of Battle controversy during the Vietnam War.

46. DARPA Shredder Challenge Solved.

47. 3 Julian Assange.

48. The Pentagon's culture of secrecy.

49. Stopping Nuclear Terrorism.

50. THE SECRET FILE OF ABU GHRAIB.

Catalog

Books, media, physical & digital resources