Search Results - "IT security"
Suggested Topics within your search.
Suggested Topics within your search.
- National security 950
- Security measures 943
- Computer security 650
- Computer networks 564
- Foreign relations 528
- Security, International 522
- Prevention 513
- History 510
- Politics and government 429
- Terrorism 399
- Government policy 309
- Military policy 292
- Law and legislation 222
- Political aspects 213
- Social security 212
- Securities 207
- Social aspects 202
- International cooperation 193
- International relations 190
- Environmental sciences 180
- Environment 174
- Management 158
- Economic aspects 147
- World politics 146
- Internal security 142
- Finance 138
- Derivative securities 127
- Internet 126
- Data protection 123
- Economic policy 120
-
7061
-
7062
Flourishing Thought : Democracy in an Age of Data Hoards /
Published 2016Full text available:
Electronic eBook -
7063
Delegating Responsibility : International Cooperation on Migration in the European Union /
Published 2022Full text available:
Electronic eBook -
7064
Blindside how to anticipate forcing events and wild cards in global politics /
Published 2007Table of Contents: “…In search of energy security / Gal Luft and Anne Korin -- Emerging infectious diseases: are we prepared? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7065
Microsoft Word 2007 bible
Published 2007Table of Contents: “…Collaboration: getting along with others -- Security, tracking, and comments -- Comparing and combining collaborative documents -- SharePoint -- Groove -- Integration with other office applications -- Appendix A: Guide to Word 2003 menu commands in Word 2007 -- Appendix B: Word 2007 default key assignments.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7066
Global supply chain management
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7067
Flourishing Thought : Democracy in an Age of Data Hoards /
Published 2016Full text available:
Electronic eBook -
7068
Delegating Responsibility : International Cooperation on Migration in the European Union /
Published 2022Full text available:
Electronic eBook -
7069
COVID-19 and World Order : The Future of Conflict, Competition, and Cooperation /
Published 2020Table of Contents: “…Global climate and energy policy after the COVID-19 pandemic: The tug-of-war between markets and politics / Johannes Urpelainen ; No food security, no world order / Jessica Fanzo ; Flat no longer: Technology in the post-COVID world / Christine Fox and Thayer Scott -- Part IV: The future of the global economy. …”
Full text available:
Electronic eBook -
7070
COVID-19 and World Order : The Future of Conflict, Competition, and Cooperation /
Published 2020Table of Contents: “…Global climate and energy policy after the COVID-19 pandemic: The tug-of-war between markets and politics / Johannes Urpelainen ; No food security, no world order / Jessica Fanzo ; Flat no longer: Technology in the post-COVID world / Christine Fox and Thayer Scott -- Part IV: The future of the global economy. …”
Full text available:
Electronic eBook -
7071
Regulatory breakdown the crisis of confidence in U.S. regulation /
Published 2012Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7072
The ten-minute inservice 40 quick training sessions that build teacher effectiveness /
Published 2013Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7073
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7074
Regulatory breakdown the crisis of confidence in U.S. regulation /
Published 2012Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7075
The ten-minute inservice 40 quick training sessions that build teacher effectiveness /
Published 2013Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7076
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7077
American spies : espionage against the US from the Cold War to the present /
Published 2013Table of Contents: “…The Cold War: 1950-1970 -- The KGB rebuilds -- Spies in the enlisted ranks -- Vietnam and the 1960s -- Decade of turmoil: the 1970s -- Espionage and the 1970s -- Soviet science and technology espionage -- James Angleton and the spy hunt in the CIA -- The decade of the spy: Soviet spies of the 1980s -- Espionage in the 1980s -- Evil spy for the evil empire: John Walker -- The spy in the National Security Agency: Ronald Pelton -- A spy in the CIA: Edward Lee Howard -- The spy in the US Marine Corps: Clayton Lonetree -- The decade of the spy: other spies of the 1980s -- An illegal in the CIA: Karl Koecher -- The Army's John Walker: Clyde Conrad -- Spies for East Germany: James Michael Hall and Jeffrey Carney -- The spy for China: Larry Wu-Tai Chin -- The spy for Israel: Jonathan Pollard -- Espionage and the new world order: the 1990s -- The end of the Cold War and US counterespionage -- Aldrich Ames and his impact on the CIA -- The spy in the FBI: Robert Hanssen -- The last vestiges of Cold War espionage -- Espionage in the new millennium -- New threats, old threats -- Chinese nuclear espionage and Wen Ho Lee -- Spies for China -- Spies for Cuba I: Ana Belen Montes -- Spies for Cuba II: Kendall and Gwendolyn Myers -- Espionage and the war on terrorism -- Cyberespionage.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7078
American spies : espionage against the US from the Cold War to the present /
Published 2013Table of Contents: “…The Cold War: 1950-1970 -- The KGB rebuilds -- Spies in the enlisted ranks -- Vietnam and the 1960s -- Decade of turmoil: the 1970s -- Espionage and the 1970s -- Soviet science and technology espionage -- James Angleton and the spy hunt in the CIA -- The decade of the spy: Soviet spies of the 1980s -- Espionage in the 1980s -- Evil spy for the evil empire: John Walker -- The spy in the National Security Agency: Ronald Pelton -- A spy in the CIA: Edward Lee Howard -- The spy in the US Marine Corps: Clayton Lonetree -- The decade of the spy: other spies of the 1980s -- An illegal in the CIA: Karl Koecher -- The Army's John Walker: Clyde Conrad -- Spies for East Germany: James Michael Hall and Jeffrey Carney -- The spy for China: Larry Wu-Tai Chin -- The spy for Israel: Jonathan Pollard -- Espionage and the new world order: the 1990s -- The end of the Cold War and US counterespionage -- Aldrich Ames and his impact on the CIA -- The spy in the FBI: Robert Hanssen -- The last vestiges of Cold War espionage -- Espionage in the new millennium -- New threats, old threats -- Chinese nuclear espionage and Wen Ho Lee -- Spies for China -- Spies for Cuba I: Ana Belen Montes -- Spies for Cuba II: Kendall and Gwendolyn Myers -- Espionage and the war on terrorism -- Cyberespionage.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7079
-
7080
Annual World Bank Conference on Development Economics, 2000
Published 2001An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook