Search Results - "IT security"
Suggested Topics within your search.
Suggested Topics within your search.
- National security 950
- Security measures 943
- Computer security 650
- Computer networks 564
- Foreign relations 528
- Security, International 522
- Prevention 513
- History 510
- Politics and government 429
- Terrorism 399
- Government policy 309
- Military policy 292
- Law and legislation 222
- Political aspects 213
- Social security 212
- Securities 207
- Social aspects 202
- International cooperation 193
- International relations 190
- Environmental sciences 180
- Environment 174
- Management 158
- Economic aspects 147
- World politics 146
- Internal security 142
- Finance 138
- Derivative securities 127
- Internet 126
- Data protection 123
- Economic policy 120
-
7121
Gender and power relations in Nigeria
Published 2013Table of Contents: “…Oladoyin -- African women and the changing notion of security / Funso Adesola -- "Unknown soldier" : women's radicalism and activism and state violence in 20th century Nigeria / Moj�ub�aol�u Ol�uf�unk�e Okome -- Women, grass roots movements and democratization in Nigeria / Iwebunor Okwechime and Akin Iwilade -- Gender and the Niger Delta crises : the challenge of local feminisms / Mashood Omotosho -- Gender, environment and human rights violations in Nigeria's Niger Delta region / Iwebunor Okwechime and Akin Iwilade.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7122
American spies : espionage against the US from the Cold War to the present /
Published 2013Table of Contents: “…The Cold War: 1950-1970 -- The KGB rebuilds -- Spies in the enlisted ranks -- Vietnam and the 1960s -- Decade of turmoil: the 1970s -- Espionage and the 1970s -- Soviet science and technology espionage -- James Angleton and the spy hunt in the CIA -- The decade of the spy: Soviet spies of the 1980s -- Espionage in the 1980s -- Evil spy for the evil empire: John Walker -- The spy in the National Security Agency: Ronald Pelton -- A spy in the CIA: Edward Lee Howard -- The spy in the US Marine Corps: Clayton Lonetree -- The decade of the spy: other spies of the 1980s -- An illegal in the CIA: Karl Koecher -- The Army's John Walker: Clyde Conrad -- Spies for East Germany: James Michael Hall and Jeffrey Carney -- The spy for China: Larry Wu-Tai Chin -- The spy for Israel: Jonathan Pollard -- Espionage and the new world order: the 1990s -- The end of the Cold War and US counterespionage -- Aldrich Ames and his impact on the CIA -- The spy in the FBI: Robert Hanssen -- The last vestiges of Cold War espionage -- Espionage in the new millennium -- New threats, old threats -- Chinese nuclear espionage and Wen Ho Lee -- Spies for China -- Spies for Cuba I: Ana Belen Montes -- Spies for Cuba II: Kendall and Gwendolyn Myers -- Espionage and the war on terrorism -- Cyberespionage.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7123
Central and East European politics : from communism to democracy /
Published 2015Table of Contents: “…POLICIES AND ISSUES -- The political transition / Valerie Bunce -- Re-creating the market / Sharon Fisher -- Social aspects of transformation / Alfio Cerami -- Ethnicity, nationalism, and the expansion of democracy / Zsuzsa Csergo -- Women's participation in postcommunist politics / Marilyn Rueschemeyer -- Transitional justice in Central and Eastern Europe / Peter Ro�zi�c and Brian Grodsky -- EU accession and after / Ronald Linden with Shane Killian -- Security issues : NATO and beyond / Joshua Spero -- PART 3. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7124
-
7125
-
7126
-
7127
The Role of Civil Society in Climate Change Response and Mitigation Strategies: An Analysis of the Kenya Climate Change Working Group
Published 2024“…MASTER OF ARTS in Diplomacy, Development, and International Security…”
Get full text
Thesis -
7128
-
7129
-
7130
Nonhuman Witnessing : War, Data, and Ecology after the End of the World /
Published 2023Full text available:
Electronic eBook -
7131
War Pictures : Cinema, Violence, and Style in Britain, 1939-1945 /
Published 2017Full text available:
Electronic eBook -
7132
Unemployment Insurance Reform : Fixing a Broken System /
Published 2018Full text available:
Electronic eBook -
7133
Making Refuge : Somali Bantu Refugees and Lewiston, Maine /
Published 2016Full text available:
Electronic eBook -
7134
The Art of Neighbouring : Making Relations Across China's Borders /
Published 2017Full text available:
Electronic eBook -
7135
Regulatory breakdown the crisis of confidence in U.S. regulation /
Published 2012Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7136
The ten-minute inservice 40 quick training sessions that build teacher effectiveness /
Published 2013Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7137
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7138
Regulatory breakdown the crisis of confidence in U.S. regulation /
Published 2012Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7139
The ten-minute inservice 40 quick training sessions that build teacher effectiveness /
Published 2013Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7140
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook