نتایج جستجو برای: espionage
تعداد نتایج: 371 فیلتر نتایج به سال:
Until recently, the study and understanding of plant and animal signalling and response mechanisms have developed independently. Recent biochemical and molecular work is producing a growing list of elements involved in responses to biotic and abiotic stimuli that are very similar across kingdoms. Some of the more interesting examples of these include prostaglandin/octadecanoid-mediated response...
Artykuł recenzyjny jest poświęcony zeszytowi metodologicznemu wydanemu przez ukraińskich poligraferów. Przedstawili oni gotowe rozwiązania, które można zastosować podczas badań osób podejrzanych o sabotaż oraz szpiegostwo. W recenzowanej publikacji zostały omówione między innymi techniki przeprowadzania poligraficznych przytoczone przykłady zestawów pytań używanych w trakcie testów. Notes on th...
The article discusses the main stages of development domestic legislation on criminal liability for disclosure state secrets from 1397 to 1996. Within periods 1917, 1917 1943 and 1996 characteristic feature first second responsibility is that there was no separate norm providing this crime persons beyond military. In addition, some acts qualified as were previously equated espionage entailed mu...
After the beginning of conflict in Ukraine and Russia’s annexation Crimean Peninsula, Czech Republic became fully aware threats posed by Kremlin despite President Zeman has denied presence Russian troops criticised EU sanctions against Russia. Czechia belongs to group countries through which Russia influences EU, gradually deliberately erode its structures. exerts a strong influence on non-mili...
The amendment by Law nº 14.197/2021, which introduced art. 359-K, § 4º, in the Brazilian Penal Code, provides a cause for exclusion of criminal liability case communication, delivery or publication information and documents classified as secret, protecting whistleblowers against convictions espionage, whenever purpose disclosure is to expose practice crime violation human rights. present articl...
Unmanned aerial vehicles (UAVs) can be used for a variety of illegal activities (e.g., industrial espionage, smuggling, terrorism). Given their growing popularity and availability, advances in communications technology, more sophisticated ways to disable these must sought. Various forms jamming are drones, but advanced techniques such as deception UAV takeover considerably difficult implement, ...
Abstract In 1608, Antonio Barisone (1557/8–1623), rector of the Jesuit college at Ferrara, became ensnared in an elaborate deception designed to expose unscrupulous methods by which Jesuits exploited vulnerable wealthy widows and enlarged material wealth their Society. Entering into a correspondence with Venetian noblewoman who lamented loss her confessor following expulsion Society Jesus from ...
VLC (Visible Light Communications) have been recently proposed as a new form of wireless communications. The advantages are its usage the spectrum visible light which is not licensed; additionally, it gives high data rates, protects user against espionage and does suffer from interference electromagnetic spectrum. One main techniques used in HACO-OFDM (Hybrid Asymmetrically Clipped Optical - Or...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید