Search Results - "environmental security"

  1. 181

    Emerging Threats to Energy Security and Stability by McPherson, Hugo

    Published 2005
    “…NATO Security through Science Series, Series C: Environmental Security…”
    Get full text
    Electronic eBook
  2. 182

    Equidosimetry Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Proceedings of the NATO Advanced Research Workshop on Ecological Standardizat... by Brchignac, F.

    Published 2005
    “…NATO Security through Science Series, Series C: Environmental Security…”
    Get full text
    Electronic eBook
  3. 183

    Air Pollution Modeling and Its Application XIX by Borrego, Carlos

    Published 2008
    “…NATO Science for Peace and Security Series Series C: Environmental Security,…”
    Get full text
    Electronic eBook
  4. 184

    The Socio-Economic Causes and Consequences of Desertification in Central Asia by Behnke, Roy

    Published 2008
    “…NATO Science for Peace and Security Series, Series C: Environmental Security,…”
    Get full text
    Electronic eBook
  5. 185

    Sustainable Use and Development of Watersheds by Gnen, . Ethem

    Published 2008
    “…NATO Science for Peace and Security Series, Series C: Environmental Security,…”
    Get full text
    Electronic eBook
  6. 186

    The ethics of care a feminist approach to human security / by Robinson, Fiona, 1965-

    Published 2011
    Table of Contents: “…Introduction -- The ethics of care and global politics -- Rethinking human security -- 'Women's work' : the global care and sex economies -- Humanitarian intervention and global security governance -- Peacebuilding and paternalism : reading care through postcolonialism -- Health and human security : gender, care and HIV/AIDS -- Gender, care, and the ethics of environmental security -- Conclusion. Security through care.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 187

    The ethics of care a feminist approach to human security / by Robinson, Fiona, 1965-

    Published 2011
    Table of Contents: “…Introduction -- The ethics of care and global politics -- Rethinking human security -- 'Women's work' : the global care and sex economies -- Humanitarian intervention and global security governance -- Peacebuilding and paternalism : reading care through postcolonialism -- Health and human security : gender, care and HIV/AIDS -- Gender, care, and the ethics of environmental security -- Conclusion. Security through care.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 188

    The politics of space security strategic restraint and the pursuit of national interests / by Moltz, James Clay

    Published 2011
    Table of Contents: “…The dynamics of space security : existing explanations -- Space and environmental security -- Roots of the U.S.-Soviet space race : 1920s-1962 -- The emergence of cooperative restraint : 1962-1975 -- Challenges to space security and their resolution : 1976-1991 -- Post-Cold War space uncertainty : 1992-2000 -- Renewed U.S. space nationalism : 2001-2008 -- Expanding international norms amid tensions : 2009-present -- Alternative futures for space security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 189

    The politics of space security strategic restraint and the pursuit of national interests / by Moltz, James Clay

    Published 2011
    Table of Contents: “…The dynamics of space security : existing explanations -- Space and environmental security -- Roots of the U.S.-Soviet space race : 1920s-1962 -- The emergence of cooperative restraint : 1962-1975 -- Challenges to space security and their resolution : 1976-1991 -- Post-Cold War space uncertainty : 1992-2000 -- Renewed U.S. space nationalism : 2001-2008 -- Expanding international norms amid tensions : 2009-present -- Alternative futures for space security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 190

    Too poor for peace? global poverty, conflict, and security in the 21st century /

    Published 2007
    Table of Contents: “…Kahl -- Resource and environmental security / Anthony Nyong -- The demographics of political violence : youth bulges, insecurity, and conflict / Henrik Urdal -- Embracing the margins : working with youth amid war and insecurity / Marc Sommers -- The role of leadership in overcoming poverty and achieving security in Africa / Robert I. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 191

    Too poor for peace? global poverty, conflict, and security in the 21st century /

    Published 2007
    Table of Contents: “…Kahl -- Resource and environmental security / Anthony Nyong -- The demographics of political violence : youth bulges, insecurity, and conflict / Henrik Urdal -- Embracing the margins : working with youth amid war and insecurity / Marc Sommers -- The role of leadership in overcoming poverty and achieving security in Africa / Robert I. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 192

    The state of sovereignty territories, laws, populations /

    Published 2009
    Table of Contents: “…Kelly and Martha Kaplan -- Sovereignty after socialism at Europe's new borders / Keith Brown -- Environmental security, spatial preservation, and state sovereignty in Central Africa / Kevin C. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 193

    The state of sovereignty territories, laws, populations /

    Published 2009
    Table of Contents: “…Kelly and Martha Kaplan -- Sovereignty after socialism at Europe's new borders / Keith Brown -- Environmental security, spatial preservation, and state sovereignty in Central Africa / Kevin C. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 194

    Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace by Gleditsch, Nils Petter

    Published 2015
    Get full text
    Electronic eBook
  15. 195

    Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace by Gleditsch, Nils Petter

    Published 2015
    Get full text
    Electronic eBook
  16. 196

    Security a multidisciplinary normative approach /

    Published 2009
    Table of Contents: “…Bailliet -- Democratic security / Christopher Kutz -- Global procedural rights and security / Larry May -- Women's security/state security / Naomi Cahn -- Security in a "warming world" : competences of the UN Security Council for preventing dangerous climate change / Christina Voigt -- Environmental security and the UN Security Council / Jo Stigen & Ole Kristian Fauchald -- Pragmatic law for international security / Sean Kanuck.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 197

    Security a multidisciplinary normative approach /

    Published 2009
    Table of Contents: “…Bailliet -- Democratic security / Christopher Kutz -- Global procedural rights and security / Larry May -- Women's security/state security / Naomi Cahn -- Security in a "warming world" : competences of the UN Security Council for preventing dangerous climate change / Christina Voigt -- Environmental security and the UN Security Council / Jo Stigen & Ole Kristian Fauchald -- Pragmatic law for international security / Sean Kanuck.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 198

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  19. 199

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  20. 200

    North American Arctic : Themes in Regional Security /

    Published 2019
    Table of Contents: “…The North American Arctic Maritime and Environmental Security Workshop 2018: summary workshop report -- 7. …”
    Full text available:
    Electronic eBook