-
-
-
-
-
-
United States and Israeli Homeland Security
This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland S
-
When is Russia Joining NATO? Russian Security Orientation in the Twenty-First Century
This study seeks to analyze Russia's security situation, its relationship with NATO and if NATO can
-
Targeting National Security
Many theories have arisen to describe how best to use the military as a coercive tool. This thesis
-
Should the U.S. Department of State Continue to Use Private Security Contractors to Protect U.S. Diplomats?
On September 16, 2007 in Baghdad, Iraq, members of an American protective security detail, composed
-
Security in Afghanistan the Key First Ingredient to Building Peace in a "Failed State"
Operations in Afghanistan began less than 1-month after the horrific events of 11 September 2001. A
-
Gulf Security in the Twenty-First Century
This Document was developed to explore the various aspects of security for the countries of the Gul
-
How is MS-13 a Threat to US National Security?
Street gangs have been a regional problem in the United States for a long time, but today's gangs s
-
United States National Security Interests and North Korea
United States (US) policy towards North Korea has struggled to adequately address the US national s
-
Security Sector Reform
The authors explore the definition of SSR as it has emerged in the international community. The mak
-
Stabilization, Security, Transition, and Reconstruction
Today, there is a considerable amount of discussion on whole of government approaches and building
-
North East Asian Regional Power Security Issues of Korean Unification
Divided in 1945 between the United States and the Soviet Union, Korea's status was as much a testam
-
Globalized Security Reshaping America's Defense Trade Policy
Globalism is altering military, economic, and political forces, and their confluence has become out
-
Engaging African Sub-Regional Organizations to Improve Continental Stability and Security
Abstract The United States has been engaged on the African continent for one reason or another for
-
Intergovernmental Service Agreements Between the U.S. Department of Homeland Security
The United States Immigration and Customs Enforcement (ICE) is a government law agency ran by the U
-
United Nations Sanctions Regimes and Selective Security
Routledge 出版This book investigates the selective nature of UN sanctions regimes with a specific focus on the po
-
The Economic and Military Development of China and Its Implications on U.S. National Security
US, China, and Taiwan: the ties that bind The relationship of Republic of China (ROC), the People's
-
The Domestic Economy and Post 9/11 National Security
The American domestic economy is the backbone of US national strength. It funds the national instru
-
Security Sector Reform
The authors explore the definition of SSR as it has emerged in the international community. The mak
-
Promoting Japan and South Korea's Role in East Asian Security
The State Partnership Program, a National Guard supported initiative, is one of the many Theater Se
-
Routledge Handbook of Disinformation and National Security
Routledge 出版This interdisciplinary Handbook provides an in-depth analysis of the complex security phenomenon of
-
Human Security and Epidemics in Africa
Routledge 出版This book examines the impact of epidemics in Africa, exploring some of the adaptation and crisis m
-
Comparative Analysis on the Cost of Oversight for the New National Security Space Acquisition Policy
For the past 50 years, the military's use of space for our national defense has increased exponenti
-
Modeling Homeland Security
The events of September 11, 2001 have propelled the topic of homeland security to the forefront of
-
Evaluating U.S. Air Force Nuclear Weapon Storage Area Security in the Post Cold-War Environment
Air Force physical nuclear standards have not changed significantly since the end of the Cold War.
-
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it tr
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Comparative Analysis on the Cost of Oversight for the New National Security Space Acquisition Policy
For the past 50 years, the military's use of space for our national defense has increased exponenti
-
A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
This research effort identifies attributes of distributed event correlation which make it desirable
-
UN Security Council Enlargement
The United Nations Security Council has had in its history a single flash of true international rel
-
UN Security Council Enlargement
The United Nations Security Council has had in its history a single flash of true international rel
-
The Future of Space Exploration and Security Capabilities
This paper applies scenario-based thinking as described in Peter Schwartz's The Art of the Long Vie
-
The Domestic Economy and Post 9/11 National Security
The American domestic economy is the backbone of US national strength. It funds the national instru
-
Implications of the Militarization of US Foreign Policy Through Security Assistance
Building the capacity of foreign military forces to counter terrorism and conduct stability operati
-
Security Sector Reform
The authors explore the definition of SSR as it has emerged in the international community. The mak
-
How is MS-13 a Threat to US National Security?
Street gangs have been a regional problem in the United States for a long time, but today's gangs s
-
Air Force Energy Security
The price of crude oil recently soared past $115 per barrel, resulting in the most expensive gasoli
-
Evaluating U.S. Air Force Nuclear Weapon Storage Area Security in the Post Cold-War Environment
Air Force physical nuclear standards have not changed significantly since the end of the Cold War.
-
Air Force Energy Security
The price of crude oil recently soared past $115 per barrel, resulting in the most expensive gasoli
-
Prison Security
These security tips checklists were compiled from prison security training seminars conducted throu
-
Building Security and Partnership Through African Regional Organizations
In 2002, the African Union (AU) was created with the aim of strengthening integration among member
-
Gulf Security in the Twenty-First Century
This Document was developed to explore the various aspects of security for the countries of the Gul
-
The Proliferation Security Initiative
This Air University research paper is an examination of the Proliferation Security Initiative. Thro