Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Australian Security and Intelligence Organisation.

Książki na temat „Australian Security and Intelligence Organisation”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych książek naukowych na temat „Australian Security and Intelligence Organisation”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.

1

Blesing, Meena. Was your dad a Russian spy?: The personal story of the Combe/Ivanov affair by David Combe's wife. South Melbourne, Australia: Sun Books, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

1954-, Bergin Anthony, Hall Robert A. 1947- i Australian Defence Studies Centre, red. Intelligence: And Australian national security. Canberra, A.C.T: Australian Defence Studies Centre, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Marsden, Hope Robert, red. Report on the Australian Security Intelligence Organization, December 1984. Canberra: Aust. Govt. Publ. Service, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Flood, Philip. Report of the inquiry into Australian intelligence agencies. Canberra: Dept. of the Prime Minister and Cabinet, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Tubbs, Michael. ASIO: The enemy within. Croyden Park, NSW: M. Tubbs, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Gobert, Wayne. The origins of Australian diplomatic intelligence in Asia, 1933-1941. Canberra, Australia: Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sasson, Molly J. More cloak than dagger: One woman's career in secret intelligence. Ballarat, Vic: Connor Court Publishing, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Wesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Ottawa, Ont: Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Capp, Fiona. Writers defiled. Ringwood, Vic: McPhee Gribble, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

David, McKnight. Australia's spies and their secrets. St. Leonards, NSW, Australia: Allen & Unwin, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Hocking, Jenny. Terror laws: ASIO, counter-terrorism and the threat to democracy. Sydney, NSW, Australia: UNSW Press, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

McNab, Claire. Murder undercover: A Denise Cleever thriller. Tallahassee, Fla: Naiad Press, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Jacobsen, Hans Adolf. The Nazi Party and the German Foreign Office. New York: Routledge, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Benjamin, Daniel. The next attack: The failure of the war on terror and a strategy for getting it right. New York: Owl Books/Henry Holt, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

H, Kean Thomas, i Hamilton Lee, red. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: National Commission on Terrorist Attacks upon the United States, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

H, Kean Thomas, i Hamilton Lee, red. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks Upon the United States. New York: W.W. Norton, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

National Commission on Terrorist Attacks upon the United States. The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. New York: Norton, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

National Commission on Terrorist Attacks upon the United States. 11-S, el informe: Extracto del informe final de los atentados terroristas contra Estados Unidos. Barcelona: Paidós, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Svantesson, Dan Jerker B., i Rebecca Azzopardi. Systematic Government Access to Private-Sector Data in Australia. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0010.

Pełny tekst źródła
Streszczenie:
The chapter provides a summary of Australian privacy law including the Privacy Act and the Australian Privacy Principles. After describing the national legal context and fundamental principles governing Australia’s federal system of government with power distributed among six states, two territories, and the federal government, it describes laws separately governing law enforcement and intelligence agencies, including the Australian Security Intelligence Organisation (ASIO). The authors suggest that, although the Australian government has a range of powers to obtain private-sector data, those powers appear primarily aimed at obtaining specific data for specific purposes. Little was found by way of direct unmediated access by the government to private-sector data or government access to private-sector data in bulk.
Style APA, Harvard, Vancouver, ISO itp.
23

Cain, Frank. The Australian Security Intelligence Organization. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Australian Security Intelligence Organization: An Unofficial History. Routledge, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Cain, Frank. Australian Security Intelligence Organization: An Unofficial History. Taylor & Francis Group, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Cain, Frank. Australian Security Intelligence Organization: An Unofficial History. Taylor & Francis Group, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

The Australian Security Intelligence Organization: An unofficial history. Richmond, Vic: Spectrum Publications, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

The Australian Security Intelligence Organization: An unofficial history. London, England: F. Cass, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Ottens, Reinhard W., Harald Olschok i Stephan Landrock. Recht und Organisation privater Sicherheitsdienste in Europa. Boorberg, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Cain, Frank. The Australian Security Intelligence Organization: An Unofficial History (Cass Series : Studies in Intelligence). Routledge, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Cain, Frank. The Australian Security Intelligence Organization: An Unofficial History (Cass Series: Studies in Intelligence). Routledge, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Tale of the scorpion. Sydney: Allen & Unwin, 1988.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Die Nachrichtendienste im Regelwerk der deutschen Sicherheitsverwaltung: Legitimation, Organisation und Abgrenzungsfragen. Berlin: Duncker & Humblot, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

The Petrov affair. Melbourne, Australia: Text, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Manne, Robert. Petrov Affair: Politics and Espionage. Elsevier Science & Technology Books, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Man of Intelligence: The Life of Captain Eric Nave, Code Breaker Extraordinary. ReadHowYouWant.com, Limited, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Pfennigwerth, Ian. Man of Intelligence: The Life of Captain Theodore Eric Nave, Australian Codebreaker Extraordinary. Rosenberg Publishing Pty, Limited, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Man of Intelligence: The Life of Captain Theodore Eric Nave, Australian Codebreaker Extraordinary. ReadHowYouWant.com, Limited, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

A Man of Intelligence: The Life of Captain Eric Nave, Australian Codebreaker Extraordinary. Rosenberg Publishing, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Confronting "the Enemy Within": Security Intelligence, the Police, and Counterterrorism in Four Democracies. RAND Corporation, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Moorhouse, Frank. Australia under surveillance: How should we act? 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Dirty secrets: Our ASIO files. Sydney, New South Wales: NewSouth, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Protest Years: The Official History of Asio, 1963-1975. Allen & Unwin, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Protest Years: The Official History of ASIO, 1963-1975. Allen & Unwin, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

McNab, Claire. Murder Undercover. Bella Books, Incorporated, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

de Werd, Peter. US Intelligence and Al Qaeda. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474478069.001.0001.

Pełny tekst źródła
Streszczenie:
The book provides insights on three levels. First, it examines how Al Qaeda and US narratives in the 1990s were of great importance to the formation of Al Qaeda as organisation, network and ideology. Second, it instructively details the analysis by contrasting narratives (ACN) methodology of identifying, analysing and contrasting relevant security-related macro and micro narratives. Third, it thereby fills a lacuna in intelligence studies by translating insights from discourse analysis, critical theory and security studies to enrich the practice of intelligence analysis and its study. In doing so it also contributes to ongoing debate on securitization in security studies. Rather than seeking to identify successful instances of securitization and their effects, securitization efforts in macro narratives are studied and adopted as conceptual lens. Critical micro narratives are added to highlight tensions and inconsistencies in macro narratives. This can lead to reconsider their consistency and hence the appropriateness of the level of analysis. How contested, divided or pragmatic was ‘Al Qaeda’? By comparing and contrasting narratives, engaging in reflexive ‘narrative net assessment’, the study of Al Qaeda and US narratives has revealed how defining an enemy and attempting to counter terrorist threats also contributed to the manifestation of the threat. In articulating other and self, and acting upon it, processes of identification among members and supporters of adversarial entities were strengthened.
Style APA, Harvard, Vancouver, ISO itp.
48

Dylan, Huw, David Gioe i Michael S. Goodman. The CIA and the Pursuit of Security. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474428842.001.0001.

Pełny tekst źródła
Streszczenie:
Taking declassified and publicly available sources this book provides an insight into the evolution of the Central Intelligence Agency from 1947 to the Trump Presidency. Focusing on a mix of case studies historic case studies such as The Berlin Tunnel, and The Cuban Missile Crisis. As well as discussing the internal changes and evolution of the organisation from planning covert actions, to adapting to, using and developing technology to aid in intelligence collection and analysis. The book also talks to key individuals that have shaped the organisation at different points in its history as well as how different Presidents have used the Agency to deliver political decisions. The book is balanced in its presentation of successes and failures, the latter often times more well known: Iraq being perhaps the best known example. The use of declassified documentation elevates this from being another history of the Central Intelligence Agency, into an insightful window into a famous yet secret organisation with a global brand.
Style APA, Harvard, Vancouver, ISO itp.
49

Ward, Robert, David Blundell, Caroline Stone i Karl Laird, red. National Security Law, Procedure and Practice. Wyd. 2. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198895282.001.0001.

Pełny tekst źródła
Streszczenie:
Abstract This book considers national security law with reference to the use, protection, and disclosure of intelligence and other secret material. It analyses the substantive law relating to national security, its practice, and related procedures, and the background to national security law in the UK, its development, and the constitutional issues to which it gives rise. It covers the work of the intelligence agencies, their oversight, and accountability. It focuses on the main types of executive measures taken by the government on national security grounds, for example, deportation; deprivation of citizenship; refusal of naturalisation; exclusions; the Terrorism Prevention and Investigation Measures Act 2011; the state threats, prevention and investigation measures framework; temporary exclusion orders; and proscription. It covers related legal proceedings, including Closed material proceedings, in specialist tribunals such as the Special Immigration Appeals Commission, the Prescribed Organisation Appeals Commission, and the Security Vetting Appeals Panel, as well as civil proceedings involving national security issues. The book covers sanctions and the increasingly important field of responses to state threats, for example, through measures taken under the National Security and Investment Act 2021, and deals with security issues in the criminal arena, the main offences under the Terrorism Acts and the National Security Act 2023, the approach of the criminal courts to national security matters, the impact of national security issues in inquests and public inquiries, and treatment of national security issues in education, employment, and family law, finally covering freedom of information and data protection.
Style APA, Harvard, Vancouver, ISO itp.
50

Simon, Steven, Daniel Benjamin i Simon Steven Jr. Next Attack: The Failure of the War on Terror and a Strategy for Getting It Right. Holt & Company, Henry, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii