Search Results for Military intelligence. - Narrowed by: Electronic Library SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMilitary$002bintelligence.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026ps$003d300$0026isd$003dtrue? 2024-12-05T03:24:17Z Hitler's generals in America Nazi POWs and allied military intelligence ent://SD_ILS/0/SD_ILS:321596 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Mallett, Derek R., 1969-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(321596.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780813142531/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spies in uniform British military and naval intelligence on the eve of the First World War ent://SD_ILS/0/SD_ILS:234089 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Seligmann, Matthew S., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199261505.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199261505.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity ent://SD_ILS/0/SD_ILS:520179 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520179.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Intelligence and Emerging Technologies First International Conference, MIET 2022, Noakhali, Bangladesh, September 23-25, 2022, Proceedings, Part II ent://SD_ILS/0/SD_ILS:520459 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Satu, Md. Shahriare. editor. (orcid)&#160;Moni, Mohammad Ali. editor.&#160;Kaiser, M. Shamim. editor.&#160;Arefin, Mohammad Shamsul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520459.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34622-4">https://doi.org/10.1007/978-3-031-34622-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spies, patriots, and traitors American intelligence in the Revolutionary War ent://SD_ILS/0/SD_ILS:323095 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Daigler, Kenneth A.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323095.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781626160514/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information evaluation ent://SD_ILS/0/SD_ILS:341982 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Capet, Philippe.&#160;Delvallade, Thomas.<br/>Preferred Shelf Number&#160;ONLINE(341982.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10827583">An electronic book accessible through the World Wide Web; click to view</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118899151">http://dx.doi.org/10.1002/9781118899151</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63591">http://www.books24x7.com/marc.asp?bookid=63591</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Spying in America espionage from the Revolutionary War to the dawn of the Cold War ent://SD_ILS/0/SD_ILS:242453 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Sulick, Michael J.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781589019270/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing for situation awareness an approach to user-centered design ent://SD_ILS/0/SD_ILS:291450 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Endsley, Mica R.&#160;Jones, Debra G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Howard Andrew Knox : pioneer of intelligence testing at Ellis Island ent://SD_ILS/0/SD_ILS:376154 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Richardson, John T. E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7312/rich14168">http://www.jstor.org/stable/10.7312/rich14168</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> National security issues in science, law, and technology ent://SD_ILS/0/SD_ILS:287602 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Johnson, Thomas Alfred.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420019087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversarial reasoning computational approaches to reading the opponent's mind ent://SD_ILS/0/SD_ILS:288385 2024-12-05T03:24:17Z 2024-12-05T03:24:17Z Author&#160;Kott, Alexander W.&#160;McEneaney, William M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420011012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>