Search Results - "IT security"
Suggested Topics within your search.
Suggested Topics within your search.
- National security 950
- Security measures 943
- Computer security 650
- Computer networks 564
- Foreign relations 528
- Security, International 522
- Prevention 513
- History 510
- Politics and government 429
- Terrorism 399
- Government policy 309
- Military policy 292
- Law and legislation 222
- Political aspects 213
- Social security 212
- Securities 207
- Social aspects 202
- International cooperation 193
- International relations 190
- Environmental sciences 180
- Environment 174
- Management 158
- Economic aspects 147
- World politics 146
- Internal security 142
- Finance 138
- Derivative securities 127
- Internet 126
- Data protection 123
- Economic policy 120
-
61
Human security from concept to practice : case studies from Northeast India and Orissa /
Published 2011Table of Contents: “…Constructing a human security governance index for Northeast India / Kalyan Das -- Human security mapping in conflict zones, the case of Northeast India / Nani G. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
62
Cornerstones of security arms control treaties in the nuclear era /
Published 2002Table of Contents: “…Voluntary Safeguard Agreement -- The Seabed Arms Control Treaty -- The "Accidents Measures" Agreement -- The Biological Weapons Convention -- The Incidents at Sea Agreement -- The Strategic Arms Limitation Talks -- The Threshold Test Ban Treaty -- The Peaceful Nuclear Explosions Treaty -- The Environmental Modification Convention -- The Convention on the Physical Protection of Nuclear Material -- Convention on Certain Conventional Weapons -- Nuclear Risk Reduction Centers -- The Ballistic Missile Launch Notification Agreement -- The Intermediate-Range Nuclear Forces Treaty -- The Conventional Armed Forces in Europe Treaty -- The Open Skies Treaty -- The Strategic Arms Reduction Treaties (START I & II) -- The Chemical Weapons Convention -- The agreed framework -- Confidence and security measures documents -- The Comprehensive Nuclear Test Ban Treaty -- The Ottawa Convention on Landmines -- Treaty on Strategic Offensive Reductions.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
63
-
64
The freedom of security governing Canada in the age of counter-terrorism /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
65
Global security a vision for the future : addressing the challenges and opportunities for research in the information age /
Published 2011Table of Contents: “…Modeling security -- pt. 3. Identity, loyalty and security -- pt. 4. …”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
66
Energy security an interdisciplinary approach /
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
67
Secure the shadow poems /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
68
Speculative security the politics of pursuing terrorist monies /
Published 2012Table of Contents: “…Introduction: the politics of terrorism financing -- Mediating terrorist money -- The finance/security assemblage -- Following the money: risk, preemption, and the mobile norm -- Cash and the circuits of transnational kinship -- Zakat and the securitization of charitable donation -- Money and modern exile -- Conclusion: premediation and contestation.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
69
Conflict of securities reflections on state and human security in Africa /
Published 2010Subjects: “…National security Africa.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
70
Governing security the hidden origins of American security agencies /
Published 2013Subjects: “…United States. Federal Security Agency.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
71
Social security the unfinished work /
Published 2010Subjects: “…Social security United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
72
In/security in Colombia writing political identities in the Democratic Security Policy /
Published 2010Subjects: “…National security Colombia.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
73
Virtualization security protecting virtualized environments /
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
74
Security and suspicion an ethnography of everyday life in Israel /
Published 2011Table of Contents: “…Introduction: the practice of everyday security -- A genealogy of Israeli security -- Senses of security : rebuilding Cafe Hillel -- Paad : fear as corporeal politics -- Embodying suspicion -- Projecting security on the city -- On IKEA and army boots : the domestication of security -- Seeing, walking, securing : tours of Israel's separation wall -- Epilogue: real fantasies of security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
75
Social security background, issues and proposals /
Published 2011Subjects: “…Social security United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
76
Afghanistan security
Published 2009Subjects: “…National security Afghanistan.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
77
Border security barriers along the U.S. international border /
Published 2009Subjects: “…Border security United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
78
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
79
Surveillance or security? the risks posed by new wiretapping technologies /
Published 2010Subjects: “…Telecommunication Security measures United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
80
Natural security a Darwinian approach to a dangerous world /
Published 2008Table of Contents: “…origins of natural security /…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook