Search Results - "environmental security"
Suggested Topics within your search.
Suggested Topics within your search.
- Environmental sciences 122
- Environment 116
- Environmental management 56
- Environmental Management 54
- Environmental pollution 54
- Waste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution 42
- Environmental Monitoring/Analysis 38
- Climate Change 36
- Climatic changes 36
- Geography 36
- Ecotoxicology 34
- Environmental toxicology 34
- Environment, general 30
- Environmental protection 25
- Sustainable development 23
- Sustainable Development 22
- Earth Sciences 20
- Environmental Economics 18
- Environmental Law/Policy/Ecojustice 18
- Environmental economics 18
- Environmental law 18
- Economics 16
- Hydraulic engineering 14
- Hydrogeology 14
- Math. Appl. in Environmental Science 12
- Quality Control, Reliability, Safety and Risk 12
- System safety 12
- Atmospheric Protection/Air Quality Control/Air Pollution 10
- Ecology 10
- Ecosystems 10
-
181
Emerging Threats to Energy Security and Stability
Published 2005“…NATO Security through Science Series, Series C: Environmental Security…”
Get full text
Electronic eBook -
182
Equidosimetry Ecological Standardization and Equidosimetry for Radioecology and Environmental Ecology Proceedings of the NATO Advanced Research Workshop on Ecological Standardizat...
Published 2005“…NATO Security through Science Series, Series C: Environmental Security…”
Get full text
Electronic eBook -
183
Air Pollution Modeling and Its Application XIX
Published 2008“…NATO Science for Peace and Security Series Series C: Environmental Security,…”
Get full text
Electronic eBook -
184
The Socio-Economic Causes and Consequences of Desertification in Central Asia
Published 2008“…NATO Science for Peace and Security Series, Series C: Environmental Security,…”
Get full text
Electronic eBook -
185
Sustainable Use and Development of Watersheds
Published 2008“…NATO Science for Peace and Security Series, Series C: Environmental Security,…”
Get full text
Electronic eBook -
186
The ethics of care a feminist approach to human security /
Published 2011Table of Contents: “…Introduction -- The ethics of care and global politics -- Rethinking human security -- 'Women's work' : the global care and sex economies -- Humanitarian intervention and global security governance -- Peacebuilding and paternalism : reading care through postcolonialism -- Health and human security : gender, care and HIV/AIDS -- Gender, care, and the ethics of environmental security -- Conclusion. Security through care.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
187
The ethics of care a feminist approach to human security /
Published 2011Table of Contents: “…Introduction -- The ethics of care and global politics -- Rethinking human security -- 'Women's work' : the global care and sex economies -- Humanitarian intervention and global security governance -- Peacebuilding and paternalism : reading care through postcolonialism -- Health and human security : gender, care and HIV/AIDS -- Gender, care, and the ethics of environmental security -- Conclusion. Security through care.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
188
The politics of space security strategic restraint and the pursuit of national interests /
Published 2011Table of Contents: “…The dynamics of space security : existing explanations -- Space and environmental security -- Roots of the U.S.-Soviet space race : 1920s-1962 -- The emergence of cooperative restraint : 1962-1975 -- Challenges to space security and their resolution : 1976-1991 -- Post-Cold War space uncertainty : 1992-2000 -- Renewed U.S. space nationalism : 2001-2008 -- Expanding international norms amid tensions : 2009-present -- Alternative futures for space security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
189
The politics of space security strategic restraint and the pursuit of national interests /
Published 2011Table of Contents: “…The dynamics of space security : existing explanations -- Space and environmental security -- Roots of the U.S.-Soviet space race : 1920s-1962 -- The emergence of cooperative restraint : 1962-1975 -- Challenges to space security and their resolution : 1976-1991 -- Post-Cold War space uncertainty : 1992-2000 -- Renewed U.S. space nationalism : 2001-2008 -- Expanding international norms amid tensions : 2009-present -- Alternative futures for space security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
190
Too poor for peace? global poverty, conflict, and security in the 21st century /
Published 2007Table of Contents: “…Kahl -- Resource and environmental security / Anthony Nyong -- The demographics of political violence : youth bulges, insecurity, and conflict / Henrik Urdal -- Embracing the margins : working with youth amid war and insecurity / Marc Sommers -- The role of leadership in overcoming poverty and achieving security in Africa / Robert I. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
191
Too poor for peace? global poverty, conflict, and security in the 21st century /
Published 2007Table of Contents: “…Kahl -- Resource and environmental security / Anthony Nyong -- The demographics of political violence : youth bulges, insecurity, and conflict / Henrik Urdal -- Embracing the margins : working with youth amid war and insecurity / Marc Sommers -- The role of leadership in overcoming poverty and achieving security in Africa / Robert I. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
192
The state of sovereignty territories, laws, populations /
Published 2009Table of Contents: “…Kelly and Martha Kaplan -- Sovereignty after socialism at Europe's new borders / Keith Brown -- Environmental security, spatial preservation, and state sovereignty in Central Africa / Kevin C. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
193
The state of sovereignty territories, laws, populations /
Published 2009Table of Contents: “…Kelly and Martha Kaplan -- Sovereignty after socialism at Europe's new borders / Keith Brown -- Environmental security, spatial preservation, and state sovereignty in Central Africa / Kevin C. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
194
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
Published 2015Get full text
Electronic eBook -
195
Nils Petter Gleditsch: Pioneer in the Analysis of War and Peace
Published 2015Get full text
Electronic eBook -
196
Security a multidisciplinary normative approach /
Published 2009Table of Contents: “…Bailliet -- Democratic security / Christopher Kutz -- Global procedural rights and security / Larry May -- Women's security/state security / Naomi Cahn -- Security in a "warming world" : competences of the UN Security Council for preventing dangerous climate change / Christina Voigt -- Environmental security and the UN Security Council / Jo Stigen & Ole Kristian Fauchald -- Pragmatic law for international security / Sean Kanuck.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
197
Security a multidisciplinary normative approach /
Published 2009Table of Contents: “…Bailliet -- Democratic security / Christopher Kutz -- Global procedural rights and security / Larry May -- Women's security/state security / Naomi Cahn -- Security in a "warming world" : competences of the UN Security Council for preventing dangerous climate change / Christina Voigt -- Environmental security and the UN Security Council / Jo Stigen & Ole Kristian Fauchald -- Pragmatic law for international security / Sean Kanuck.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
198
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
199
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
200
North American Arctic : Themes in Regional Security /
Published 2019Table of Contents: “…The North American Arctic Maritime and Environmental Security Workshop 2018: summary workshop report -- 7. …”
Full text available:
Electronic eBook