Narrow your search
Listing 1 - 10 of 1213 << page
of 122
>>
Sort by

Book
Private veiligheid
Authors: --- ---
ISBN: 9789400015593 Year: 2022 Publisher: Brussel Larcier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Law --- veiligheid (mensen)


Multi
Patterns of Conventional Warfighting under the Nuclear Umbrella
Authors: ---
ISBN: 9783030455941 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Palgrave Pivot

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explores how nuclear weapons influence conventional warfighting, through three case studies of countries not party to the Non-Proliferation Treaty - Pakistan, India, and Israel. The author examines how decision makers choose a preferred pattern of war management, as well as how these choices affect conflicts, suggesting that nuclear weaponization constitutes a clear change in the relative power of countries. This distribution of power within the international system expands or reduces the selection of strategies or war management patterns available to members of the international community. However, historic traumatic events like military defeats, countries’ self-images, and images of enemies form the perceptions of decision makers regarding material power and change thereof, suggesting that choices of decision makers are not affected directly by changes in relative power relations, but rather through an intermediate level of strategic culture parameter. Igor Davidzon is a Postdoctoral Research Fellow in the Center for Transnational Relations, Foreign and Security Policy at Freie Universität Berlin, Germany.

Keywords

Law --- veiligheid (mensen)


Multi
Managing New Security Threats in the Caribbean
Authors: --- --- ---
ISBN: 9783030987336 9783030987329 9783030987343 9783030987350 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. With a wide-ranging look into some of the 'new' security threats facing state and non-state actors today, this book is designed to specifically offer new angles on tackling these threats in the Caribbean region. It explores issues relating to viruses, war and conflict, migration, geopolitics, climate change and terrorism through multi- and interdisciplinary perspectives on global (in-)securities. Each chapter clearly elucidates the connectedness of these non-traditional threats, drawing on a remarkable number of the most recent reports and scholarly works. Most importantly, there is a lack of Caribbean studies in the security themes that are studied. This book is a much needed and timely addition to intellectual thought on Caribbean security in an increasingly fragmented world. It will be of great interest to students of international security studies, human security, global politics, and international relations. Georgina Chami is Lecturer, Institute of International Relations, University of the West Indies, St. Augustine, Trinidad and recipient of the Central America/Caribbean Fulbright Visiting Scholars Program in 2010 Jerome Teelucksingh is Senior Lecturer, in the Faculty of Humanities and Education at The University of the West Indies, St. Augustine Campus, Trinidad. Marlon Anatol is Lecturer at the Open Campus, University of the West Indies, Trinidad.


Digital
Proxy War Ethics: The Norms of Partnering in Great Power Competition
Author:
ISBN: 9783031504587 9783031504570 9783031504594 9783031504600 Year: 2024 Publisher: Cham Springer Nature, Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
The “Five Eyes” Intelligence Sharing Relationship
Authors: --- ---
ISBN: 9783031475818 9783031475801 9783031475825 9783031475832 Year: 2024 Publisher: Cham Springer International Publishing :Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Terrorism, Radicalisation & Countering Violent Extremism
Authors: ---
ISBN: 9789811319990 Year: 2019 Publisher: Singapore Springer Nature Singapore :Imprint: Palgrave Pivot

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Big Breaches
Authors: --- ---
ISBN: 9781484266557 9781484266564 9781484278710 9781484266540 Year: 2021 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Jump-start Your SOC Analyst Career
Authors: --- ---
ISBN: 9781484269046 9781484269053 9781484269039 Year: 2021 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Terrorism, Radicalisation & Countering Violent Extremism : Practical Considerations & Concerns
Author:
ISBN: 9789811319990 Year: 2019 Publisher: Singapore Springer Singapore :Imprint: Palgrave Pivot

Loading...
Export citation

Choose an application

Bookmark

Abstract

“This is an important and timely publication, bridging the gap between academia and practitioners to provide the latter with insights based on rigorous evidence-led research.” — Dr Shiraz Maher, Director of the International Centre for the Study of Radicalisation, King’s College London This book brings together research that covers perspectives and case studies on terrorism, radicalisation and countering violent extremism (CVE). Written by experts involved in these issues at the grassroots, the book bridges the academic-practitioner gap in the field. The proliferation of academic studies and conferences devoted to these subjects has meant that policymakers and practitioners in the same fields sometimes struggle to digest the sheer volume of academic output. The same critical questions keep coming up, but it is debatable the level to which there have been tangible improvements to our real state of knowledge: knowledge in especially in terms of what “best practices” exist in the field (and what can be translated, versus what approaches remain context- and location-specific). Written in an accessible manner for the general interested reader, practitioners, and policymakers in the field, this volume comprises edited versions of papers presented at CVE workshops run by the Centre of Excellence for National Security (CENS) at the S.Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore, in 2016 and 2017. Shashi Jayakumar was educated at Oxford University where he studied History (BA 1997, D.Phil, 2001). He was a member of the Singapore government Administrative Service from 2002-2017. During this time, he was posted to various Ministries, including the Ministry of Defence. He has been the Head of CENS since 2015.


Digital
Digital Forensics Basics : A Practical Guide Using Windows OS
Author:
ISBN: 9781484238387 Year: 2019 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.

Listing 1 - 10 of 1213 << page
of 122
>>
Sort by