-
Routledge Handbook of Disinformation and National Security
Routledge 出版This interdisciplinary Handbook provides an in-depth analysis of the complex security phenomenon of
-
Human Security and Epidemics in Africa
Routledge 出版This book examines the impact of epidemics in Africa, exploring some of the adaptation and crisis m
-
The Economic and Military Development of China and Its Implications on U.S. National Security
US, China, and Taiwan: the ties that bind The relationship of Republic of China (ROC), the People's
-
The Domestic Economy and Post 9/11 National Security
The American domestic economy is the backbone of US national strength. It funds the national instru
-
Security Sector Reform
The authors explore the definition of SSR as it has emerged in the international community. The mak
-
Promoting Japan and South Korea's Role in East Asian Security
The State Partnership Program, a National Guard supported initiative, is one of the many Theater Se
-
United Nations Sanctions Regimes and Selective Security
Routledge 出版This book investigates the selective nature of UN sanctions regimes with a specific focus on the po
-
UN Security Council Enlargement
The United Nations Security Council has had in its history a single flash of true international rel
-
The Future of Space Exploration and Security Capabilities
This paper applies scenario-based thinking as described in Peter Schwartz's The Art of the Long Vie
-
The Domestic Economy and Post 9/11 National Security
The American domestic economy is the backbone of US national strength. It funds the national instru
-
Air Force Energy Security
The price of crude oil recently soared past $115 per barrel, resulting in the most expensive gasoli
-
Evaluating U.S. Air Force Nuclear Weapon Storage Area Security in the Post Cold-War Environment
Air Force physical nuclear standards have not changed significantly since the end of the Cold War.
-
UN Security Council Enlargement
The United Nations Security Council has had in its history a single flash of true international rel
-
Gulf Security in the Twenty-First Century
This Document was developed to explore the various aspects of security for the countries of the Gul
-
The Proliferation Security Initiative
This Air University research paper is an examination of the Proliferation Security Initiative. Thro
-
Norway's Security Challenges in the New World
Norway has over the past century developed its security policy based on how it, as a small state in
-
The Army National Gaurd and the Department of Homeland Security
This AY-10 USAWC resident student paper argues that the citizen-soldiers of the Army National Guard
-
Building Security and Partnership Through African Regional Organizations
In 2002, the African Union (AU) was created with the aim of strengthening integration among member
-
Air Force Energy Security
The price of crude oil recently soared past $115 per barrel, resulting in the most expensive gasoli
-
Prison Security
These security tips checklists were compiled from prison security training seminars conducted throu
-
Implications of the Militarization of US Foreign Policy Through Security Assistance
Building the capacity of foreign military forces to counter terrorism and conduct stability operati
-
Security Sector Reform
The authors explore the definition of SSR as it has emerged in the international community. The mak
-
Modeling Homeland Security
The events of September 11, 2001 have propelled the topic of homeland security to the forefront of
-
Evaluating U.S. Air Force Nuclear Weapon Storage Area Security in the Post Cold-War Environment
Air Force physical nuclear standards have not changed significantly since the end of the Cold War.
-
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it tr
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
How is MS-13 a Threat to US National Security?
Street gangs have been a regional problem in the United States for a long time, but today's gangs s
-
A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
This research effort identifies attributes of distributed event correlation which make it desirable
-
Microsoft Security Copilot
Packt 出版Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscap
-
Data Security in AI Systems
This book explores the vital intersection of AI and data security, stressing the need to safeguard
-
-
Exploring the Future of Regional Security in the Caribbean
The transnational threats of narco trafficking, arms smuggling, terrorism and organized crime, amon
-
Community Food Security Assessment Toolkit
This report provides a toolkit of standardized measurement tools for assessing various aspects of c
-
Caribbean Regional Security
Since the mid-1950s there have been attempts to create a regional military force in the English-spe
-
Radical Islam in West Africa and Effects on Security in the West Africa Sub-Region
While in the past two decades, the region of West Africa has experienced various armed conflicts, a
-
FAA Physical Security Management Program
The Department of Transportation (USDOT or DOT) is a federal cabinet department of the United State
-
Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, as Exploited by CWO John Walker
CWO John Walker led one of the most devastating spy rings ever unmasked in the US. Along with his b
-
China's Energy Security and the South China Sea
The extraordinary economic rates of growth demonstrated in the Asia-Pacific region over the past de
-
Exploring the Future of Regional Security in the Caribbean
The transnational threats of narco trafficking, arms smuggling, terrorism and organized crime, amon
-
Implications of Threat Perceptions on Security Cooperation in the Association of Southeast Asian Nations
This paper investigates the impact of national threat perceptions on security cooperation within th
-
Radical Islam in West Africa and Effects on Security in the West Africa Sub-Region
While in the past two decades, the region of West Africa has experienced various armed conflicts, a
-
African Peace and Security Architecture
In recent years, global players such as the United States, the European Union (EU) and the People's
-
Operations Security (OPSEC)
The United States Air Force (USAF) is the aerial warfare service branch of the United States Armed
-
China's Energy Security and the South China Sea
The extraordinary economic rates of growth demonstrated in the Asia-Pacific region over the past de
-
Danish Perspective on Baltic Security
This study examines Danish security policy since the end of the Cold War and offers insight into sh
-
Factors Influencing the Impacts on Security of Manning Military Posts on the United States-Mexico Border From 1865 to 1916
Colonel Edward Hatch, Commander 9th Cavalry Regiment, following the resolution of a 1877 uprising i
-
Improving Southeast Asian Security Within the ASEAN Framework -- Insurgencies and Counterinsurgencies
Since the end of the Cold War, changing global dynamics have brought about important political, soc