LEADER 01290nam--2200409---450- 001 990000973760203316 005 20091109105357.0 010 $a0-8191-9038-1 035 $a0097376 035 $aUSA010097376 035 $a(ALEPH)000097376USA01 035 $a0097376 100 $a20020221d1993----km-y0itay0103----ba 101 $aeng 102 $aUS 105 $a||||||||001yy 200 1 $aWorld union on the horizon$ethe case for supernational federation$fJames A. Yunker 210 $aLanham$cUniversity press of America$dc1993 215 $aXVI, 332 p$d22 cm 410 $12001 606 0 $aOrganizzazioni internazionali$2BNCF 676 $a321.04 700 1$aYUNKER,$bJames A.$0265686 801 0$aIT$bsalbc$gISBD 912 $a990000973760203316 951 $aXXIII.2.A. 195 (IG VIII 30 505)$b3439 G$cXXIII.2.A. 195 (IG VIII)$d00244681 959 $aBK 969 $aGIU 979 $aPATTY$b90$c20020221$lUSA01$h1321 979 $aPATTY$b90$c20020325$lUSA01$h1038 979 $c20020403$lUSA01$h1739 979 $aPATRY$b90$c20040406$lUSA01$h1707 979 $aPATRY$b90$c20080414$lUSA01$h0947 979 $aFIORELLA$b90$c20090420$lUSA01$h0914 979 $aRSIAV2$b90$c20091109$lUSA01$h1053 996 $aWorld union on the horizon$9972287 997 $aUNISA LEADER 04236nam 2200529 a 450 001 9910693954703321 005 20221108045707.0 010 $a1-84876-832-X 035 $a(CKB)2550000001232665 035 $a(StDuBDS)AH21459886 035 $a(SSID)ssj0001690305 035 $a(PQKBManifestationID)16534113 035 $a(PQKBTitleCode)TC0001690305 035 $a(PQKBWorkID)15060570 035 $a(PQKB)25058519 035 $a(OCoLC)60841456 035 $a(OCoLC)477405784 035 $a(EXLCZ)992550000001232665 100 $a20120829d2011 my 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 12$aA Need to Know$b[electronic resource] /$fby Roger J. Sutton 210 $aLeicester $cMatador$d2011 210 1$a[Washington, D.C.] :$cOffice of the National Counterintelligence Executive,$d[2003] 215 $a1 online resource (480 p.) 225 1 $aCDC health matters 300 $aBibliographic Level Mode of Issuance: Monograph 330 8 $aIn recent years, great interest in encryption and the algorithms that are used to protect information has been generated by new technologies, new threats and the release of previously restricted material. Increased computer power has given the analysts of organisations like the NSA and GCHQ a greater opportunity to break into algorithms such as the old Data Encryption Standard (DES), which for many years protected the majority of our communications. A Need To Know gives an insight into the flaws of secure communications systems and people. It highlights the pressures that a nation's security forces endure in striving to protect its population and opens the door to the sinister world of communications espionage and the intriguing politics of reading other peoples' mail. For whatever reason, governments around the world have a need to know and this novel chronicles some of the motivations and techniques by which they strive to access the enemy's secrets. A Need To Know features a host of colourful and sinister characters each with their own passions and goals and will appeal to readers interested in current affairs fiction, espionage and cryptology. Author Roger is inspired by John le Carre, The Emporer's Codes by Michael Smith and The Codebreakers by David Khan. In recent years, great interest in encryption and the algorithms that are used to protect information has been generated by new technologies, new threats and the release of previously restricted material. Increased computer power has given the analysts of organisations like the NSA and GCHQ a greater opportunity to break into algorithms such as the old Data Encryption Standard (DES), which for many years protected the majority of our communications. A Need To Know gives an insight into the flaws of secure communications systems and people. It highlights the pressures that a nation's security forces endure in striving to protect its population and opens the door to the sinister world of communications espionage and the intriguing politics of reading other peoples' mail. For whatever reason, governments around the world have a need to know and this novel chronicles some of the motivations and techniques by which they strive to access the enemy's secrets. A Need To Know features a host of colourful and sinister characters each with their own passions and goals and will appeal to readers interested in current affairs fiction, espionage and cryptology. Author Roger is inspired by John le Carre, The Emporer's Codes by Michael Smith and The Codebreakers by David Khan. 410 0$aHealth matters (Centers for Disease Control and Prevention (U.S.)) 606 $aEspionage$zUnited States$xPrevention 606 $aTerrorism$zUnited States$xPrevention 608 $aElectronic books.$2lcsh 615 0$aEspionage$xPrevention. 615 0$aTerrorism$xPrevention. 700 $aSutton$b Roger J$0993669 712 02$aUnited States.$bOffice of the National Counterintelligence Executive. 801 0$bStDuBDS 801 1$bStDuBDS 801 2$bStDuBDS 801 2$bUkPrAHLS 906 $aBOOK 912 $a9910693954703321 996 $aA Need to Know$93124923 997 $aUNINA