Listing 1 - 10 of 1213 | << page >> |
Sort by
|
Choose an application
Choose an application
This book explores how nuclear weapons influence conventional warfighting, through three case studies of countries not party to the Non-Proliferation Treaty - Pakistan, India, and Israel. The author examines how decision makers choose a preferred pattern of war management, as well as how these choices affect conflicts, suggesting that nuclear weaponization constitutes a clear change in the relative power of countries. This distribution of power within the international system expands or reduces the selection of strategies or war management patterns available to members of the international community. However, historic traumatic events like military defeats, countries’ self-images, and images of enemies form the perceptions of decision makers regarding material power and change thereof, suggesting that choices of decision makers are not affected directly by changes in relative power relations, but rather through an intermediate level of strategic culture parameter. Igor Davidzon is a Postdoctoral Research Fellow in the Center for Transnational Relations, Foreign and Security Policy at Freie Universität Berlin, Germany.
Choose an application
This book examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. With a wide-ranging look into some of the 'new' security threats facing state and non-state actors today, this book is designed to specifically offer new angles on tackling these threats in the Caribbean region. It explores issues relating to viruses, war and conflict, migration, geopolitics, climate change and terrorism through multi- and interdisciplinary perspectives on global (in-)securities. Each chapter clearly elucidates the connectedness of these non-traditional threats, drawing on a remarkable number of the most recent reports and scholarly works. Most importantly, there is a lack of Caribbean studies in the security themes that are studied. This book is a much needed and timely addition to intellectual thought on Caribbean security in an increasingly fragmented world. It will be of great interest to students of international security studies, human security, global politics, and international relations. Georgina Chami is Lecturer, Institute of International Relations, University of the West Indies, St. Augustine, Trinidad and recipient of the Central America/Caribbean Fulbright Visiting Scholars Program in 2010 Jerome Teelucksingh is Senior Lecturer, in the Faculty of Humanities and Education at The University of the West Indies, St. Augustine Campus, Trinidad. Marlon Anatol is Lecturer at the Open Campus, University of the West Indies, Trinidad.
Choose an application
Choose an application
Choose an application
Criminology. Victimology --- Law --- veiligheid (mensen) --- criminologie --- terrorisme
Choose an application
Production management --- Computer. Automation --- veiligheid (mensen) --- computerbeveiliging
Choose an application
Production management --- Computer. Automation --- veiligheid (mensen) --- computerbeveiliging
Choose an application
“This is an important and timely publication, bridging the gap between academia and practitioners to provide the latter with insights based on rigorous evidence-led research.” — Dr Shiraz Maher, Director of the International Centre for the Study of Radicalisation, King’s College London This book brings together research that covers perspectives and case studies on terrorism, radicalisation and countering violent extremism (CVE). Written by experts involved in these issues at the grassroots, the book bridges the academic-practitioner gap in the field. The proliferation of academic studies and conferences devoted to these subjects has meant that policymakers and practitioners in the same fields sometimes struggle to digest the sheer volume of academic output. The same critical questions keep coming up, but it is debatable the level to which there have been tangible improvements to our real state of knowledge: knowledge in especially in terms of what “best practices” exist in the field (and what can be translated, versus what approaches remain context- and location-specific). Written in an accessible manner for the general interested reader, practitioners, and policymakers in the field, this volume comprises edited versions of papers presented at CVE workshops run by the Centre of Excellence for National Security (CENS) at the S.Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore, in 2016 and 2017. Shashi Jayakumar was educated at Oxford University where he studied History (BA 1997, D.Phil, 2001). He was a member of the Singapore government Administrative Service from 2002-2017. During this time, he was posted to various Ministries, including the Ministry of Defence. He has been the Head of CENS since 2015.
Criminology. Victimology --- Law --- veiligheid (mensen) --- criminologie --- terrorisme
Choose an application
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.
Production management --- Computer. Automation --- veiligheid (mensen) --- computerbeveiliging
Listing 1 - 10 of 1213 | << page >> |
Sort by
|