Search Results - "IT security"
Suggested Topics within your search.
Suggested Topics within your search.
- National security 950
- Security measures 943
- Computer security 650
- Computer networks 564
- Foreign relations 528
- Security, International 522
- Prevention 513
- History 510
- Politics and government 429
- Terrorism 399
- Government policy 309
- Military policy 292
- Law and legislation 222
- Political aspects 213
- Social security 212
- Securities 207
- Social aspects 202
- International cooperation 193
- International relations 190
- Environmental sciences 180
- Environment 174
- Management 158
- Economic aspects 147
- World politics 146
- Internal security 142
- Finance 138
- Derivative securities 127
- Internet 126
- Data protection 123
- Economic policy 120
-
6701
-
6702
-
6703
-
6704
-
6705
-
6706
-
6707
-
6708
International law /
Published 2017Table of Contents: “…Sanctions, countermeasures and collective security; Part II. The Substance of International Law: 10. …”
Book -
6709
-
6710
-
6711
-
6712
Hostile intent and counter-terrorism : human factors theory and application /
Published 2015Table of Contents: “…Merging crime control and counter-terrorism in the UK / Pete Fussey -- Analysing the terrorist brain: neurobiological advances, ethical concerns and social implications / Valentina Bartolucci -- Ethical issues in surveillance and privacy / Ron Iphofen -- Deception and decision-making -- Non-verbal cues to deception and their relationship to terrorism / Dawn L Eubanks, Ke Zhang and Lara Frumkin -- Deception detection in counter-terrorism / Aldert Vrij, Sharon Leal and Samantha Mann -- A field trial to investigate human pheromones associated with hostile intent / Peter Eachus, Alex Stedmon and Les Baillie -- On the trail of the terrorist: a research environment to simulate criminal investigations / Alexandra L Sandham, Thomas C Ormerod, Coral J Dando and Tarek Menacere -- Modeling hostile intent -- Safety and security in rail systems: drawing knowledge from the prevention of railway suicide and trespass to inform security interventions / Brendan Ryan -- Tackling financial and economic crime through strategic intelligence management / Simon Andrews, Simon Polovina, Babak Akhgar, Alex Stedmon, Andrew Staniforth and Dave Fortune -- Competitive adaptation in militant networks: preliminary findings from an Islamist case study / Michael Kenney, John Horgan, Cale Horne, Peter Vining, Kathleen M. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6713
Hostile intent and counter-terrorism : human factors theory and application /
Published 2015Table of Contents: “…Merging crime control and counter-terrorism in the UK / Pete Fussey -- Analysing the terrorist brain: neurobiological advances, ethical concerns and social implications / Valentina Bartolucci -- Ethical issues in surveillance and privacy / Ron Iphofen -- Deception and decision-making -- Non-verbal cues to deception and their relationship to terrorism / Dawn L Eubanks, Ke Zhang and Lara Frumkin -- Deception detection in counter-terrorism / Aldert Vrij, Sharon Leal and Samantha Mann -- A field trial to investigate human pheromones associated with hostile intent / Peter Eachus, Alex Stedmon and Les Baillie -- On the trail of the terrorist: a research environment to simulate criminal investigations / Alexandra L Sandham, Thomas C Ormerod, Coral J Dando and Tarek Menacere -- Modeling hostile intent -- Safety and security in rail systems: drawing knowledge from the prevention of railway suicide and trespass to inform security interventions / Brendan Ryan -- Tackling financial and economic crime through strategic intelligence management / Simon Andrews, Simon Polovina, Babak Akhgar, Alex Stedmon, Andrew Staniforth and Dave Fortune -- Competitive adaptation in militant networks: preliminary findings from an Islamist case study / Michael Kenney, John Horgan, Cale Horne, Peter Vining, Kathleen M. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6714
Greater America a new partnership for the Americas in the twenty-first century /
Published 2003Table of Contents: “…Stormy relationships, new dynamics -- Global wallflower : overlooking the Americas in U.S. foreign relations -- The United States and Latin America : tackling history -- U.S. security : shifting realities -- The emerging inter-American partnership -- The trauma of the 1980s -- Where the puck is going : the world changes -- Poverty and the lack of education : the dormant volcano --…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6715
The Nile Basin national determinants of collective action /
Published 2002Table of Contents: “…Machine generated contents note: Preface, vii -- List of Abbreviations and Terms, xi -- Introduction, i -- 1 Collective Action and the Search for a Regime, I5 -- 2 Negotiating Regimes, 35 -- 3 The Three-Level Game in the Nile Basin, 57 -- 4 Food Security in Ethiopia, 91 -- 5 The Imperfect Logic of Big Projects, Io6 -- 6 The Sudan: Master of the Middle, I28 -- 7 Uganda: Egypt's Unwilling Ally, Io5 -- Conclusion: Lessons Learned? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6716
Maya intellectual renaissance identity, representation, and leadership /
Published 2005Table of Contents: “…Introduction -- Maya identity and interethnic relations -- Pan-Mayanism : the complexity of Maya culture and the process of self-representation -- Representation via ethnography : mapping the Maya image in a Guatemalan primary-school social-studies textbook -- The multiplicity of Maya voices : Maya leadership and the politics of self-representation -- Truth, human rights, and representation : the case of Rigoberta Menchú -- The ethnohistory of Maya leadership -- Theoretical basis and strategies for Maya leadership -- Maya ways of knowing : modern Maya and the elders -- Leadership and Maya intellectuality -- Indigenous rights, security, and democracy in the Americas : the Guatemalan situation -- The twenty-first century and the future of the Maya in Guatemala.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6717
Managing water resources past and present
Published 2004Table of Contents: “…Edmunds -- Water in Mediterranean history / Peregrine Horden -- The development of American water resources : planners, politicians, and constitutional interpretation / Martin Reuss -- Managing water for the future : the case of England and Wales / Ian Byatt -- Water for Europe : the creation of the European Water Framework Directive / Maria Kaika -- Water laws for water security in the twenty-first century / Stefano Burchi -- Water and conflicts, Hobbes v. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6718
The gods of Diyala transfer of command in Iraq /
Published 2008Table of Contents: “…Acknowledgments -- Map of Baquba and Buhriz -- Evolution -- Genesis -- Insurgency : a prelude -- The Easter offensive -- Insurgency : a primer -- All things conventional -- June -- Insurgency : a practicum -- IEDs : the menace beneath -- A city upon a hill : the urban morass -- A city upon a hill : the high ground -- Good things, bad people, and the pictures to prove it -- The moral fight : photogs -- Regime change -- Revisionistas : an interlude -- Holidays : Orient and Occident -- Ramadan in America -- Christmas in Iraq -- The eve of a nation -- Reformation -- Hope and salvation -- To be or not to be -- Up to the task -- Security -- Democracy.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6719
The employer's immigration compliance desk reference
Published 2009Table of Contents: “…Form I-9 general concepts -- Completing the form I-9 -- Reverification -- Recordkeeping -- Electronic I-9 systems -- Knowledge of unlawful immigration status -- Unfair employment immigration practices -- Penalties and other risks -- Immigration Reform and Control Act (IRCA) compliance tips -- Conducting an I-9 self-audit -- E-Verify, IMAGE, and SSNVS -- Social security no-match letters -- Mergers and acquisitions -- Criminal law and employer immigration law compliance (with Jonathan L. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6720
The gods of Diyala transfer of command in Iraq /
Published 2008Table of Contents: “…Acknowledgments -- Map of Baquba and Buhriz -- Evolution -- Genesis -- Insurgency : a prelude -- The Easter offensive -- Insurgency : a primer -- All things conventional -- June -- Insurgency : a practicum -- IEDs : the menace beneath -- A city upon a hill : the urban morass -- A city upon a hill : the high ground -- Good things, bad people, and the pictures to prove it -- The moral fight : photogs -- Regime change -- Revisionistas : an interlude -- Holidays : Orient and Occident -- Ramadan in America -- Christmas in Iraq -- The eve of a nation -- Reformation -- Hope and salvation -- To be or not to be -- Up to the task -- Security -- Democracy.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook