Suggested Topics within your search.
Suggested Topics within your search.
National security
132
Foreign relations
129
Diplomatic relations
99
POLITICAL SCIENCE
89
Politics and government
74
General
72
Military policy
56
Relations extérieures
52
International Relations
43
HISTORY
42
Computer security
38
History
38
International relations
35
Security measures
34
Politique et gouvernement
33
International
30
Government
28
Security, International
25
World politics
25
Defenses
22
Computer networks
21
TECHNOLOGY & ENGINEERING
21
Government policy
20
Military
20
Military Science
20
Terrorism
20
Armed Forces
19
Economic policy
19
Security (National & International)
19
Other
18
-
521Published 2010Table of Contents: “…TRADE""; ""Wheat""; ""Beef""; ""Swine""; ""Softwood lumber""; ""Byrd Amendment""; ""HUMAN AND POLITICAL RIGHTS""; ""China/the Koreas""; ""Zahra Kazemi""; ""Maher Arar""; ""The Khadrs""; ""Ukrainian elections""; ""Sudan""; ""Asian Tsunami""; ""DEFENCE POLICY""; ""Federal election and defence issues""; ""DOMESTIC AND CONTINENTAL SECURITY""; ""Canadaâ€?s national-security policy""; ""The military and the north""; ""Ballistic Missile Defence""; ""Bi-National Planning Group ""…”
Connect to this title online (unlimited users allowed)
Electronic eBook -
522by Garthoff, Raymond L.Connect to this title online (unlimited users allowed)
Published 2001
Electronic eBook -
523
-
524Published 2000Table of Contents: “…Hanson Women in Francophone West Africa in the 1930's: Unraveling a Neglected Report -- Ghislaine Lydon; Labor Migration, Gender, and Social Transformation in Rural Mali -- Maria Grosz-Ngate; Economic and Agricultural Policy Reform; Overview-MSU's Food Security Research and Outreach Program in Mali -- John M. Staatz; Food Security Policy Reform in Mali and the Sahel -- Josue Dione.…”
Connect to this title online (unlimited users allowed)
Electronic eBook -
525Published 2015Table of Contents: “…Japan’s and South Korea's Nuclear Decision Making Models -- Overview of the Cooperative Projects Implemented by the European Commission Joint Research Centre in the Nuclear Security Area Outside Europe -- Proliferation Resistance and Physical Protection (Pr&Pp) Evaluation Methodology and Applications -- Next Generation Nuclear Security Policy: Education, Research, and Experience -- The Management of Radioactive Waste in France – What is the Threat? …”
Connect to this title online
Electronic eBook -
526
-
527Published 2015Table of Contents: “…: Seeking Adequate Policy Analysis in Japan / Sukehiro Hosono -- Policy Research Movement in Local Governments / Kimie Tsuchiyama -- Policy Analysis and Normative Theory: With a Focus on Social Security Policies / Wataru Sano -- Law and public policy in contemporary Japan / Makoto Usami -- Part Two: Policy Analysis in Japanese Governments. …”
Connect to this title online (unlimited users allowed)
Electronic eBook -
528Published 2015Table of Contents: “…An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors.…”
Connect to this title online
Electronic eBook -
529by Minella, JenniferTable of Contents: Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Published 2022
Electronic eBook -
530Published 2017Table of Contents: “…., Zhu, Q., Optimal Security Policy for Protection against Heterogeneous Malware -- Wu, H., Zhou, F., Zhu, Z., Chen, Y., An Experimental Comparison of Routing and Spectrum Assignment Algorithms in Elastic Optical Networks -- Zhang, C., Varma, V., Lasaulce, S., Robust Power Modulation for Channel State Information Exchange.…”
Connect to this title online
Electronic eBook -
531Published 2023Table of Contents: “…-- References -- Russia's Challenge to Central and Eastern Europe -- 1 Introduction -- 2 The Starting Point: Roots of Putin's Revisionism -- 3 Russia's Strategic Culture -- 4 Doomed to Be an Enemy -- 5 Signals Missed -- 6 The Point of no Return -- 7 Implications for Central and Eastern Europe -- References -- Militarization of Security Policies in Central and Eastern Europe -- 1 Introduction -- 2 Theoretical Framework…”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
532Published 2007Table of Contents: “…to Environmental Security Challenges -- to environmental security -- Environmental Security: Priority Issues and Challenges in Romania and European Transition Countries -- Strategies and Methods/Approaches -- Developing highly effective environmental security policies for a sustainable development of the future. …”
Connect to this title online
Electronic eBook -
533by Bne Saad, MajdaTable of Contents: “…Note continued: Gender and Food Security: Policy Implications -- Rural Women's Voice -- 10. …”
Published 2013
Connect to this title online (unlimited users allowed)
Electronic eBook -
534by Calder, AlanTable of Contents: “…Controls and Annex AControls (6.1.3.b); Residual risks; Control objectives; Plan for security incidents; Chapter 14: Implementation; Chapter 15: Check and Act; Monitoring; Auditing; Reviewing; Act -- maintain and improve the ISMS; Chapter 16: Management Review; Chapter 17: ISO27001 Annex A; Annex A control areas and controls; Clause A5: Information security policies; Clause A6: Organisation of information security; Clause A7: Human resource security; Clause A8: Asset management; Clause A9: Access control; Clause A10: Cryptography; ITG Resources.…”
Published 2013
Connect to this title online (unlimited users allowed)
Electronic eBook -
535Published 1994Table of Contents: “…The medieval times to World War I ; The interwar years ; World War II ; The communist era -- National security policy. Threat perception ; Military doctrine ; Strategy and tactics ; Military cooperation and exchanges -- Defense organization. …”
Connect to this title via HeinOnline
Government Document Electronic eBook -
536by Stallings, WilliamTable of Contents: “…IP Security Overview -- 9.2. IP Security Policy -- 9.3. Encapsulating Security Payload -- 9.4.Combining Security Associations -- 9.5. …”
Published 2014
Book -
537by Kevany, SebastianTable of Contents: “…. -- Borders and travel -- Macro-level public health security policies -- Media and public health information -- Feasible and enforceable individual-level efforts…”
Published 2020
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
538by Calder, AlanTable of Contents: “…10.2 Third-party threat example: Target data breach -- Part 3: The CRF processes -- Chapter 11: An overview of the CRF processes -- Chapter 12: Manage and protect -- 12.1 Asset management -- 12.2 Information security policies -- 12.3 Physical and environmental security -- 12.4 Identity and access control -- 12.5 Malware protection -- 12.6 Configuration and patch management -- 12.7 Encryption -- 12.8 System security -- 12.9 Network and communications security -- 12.10 Security competence and training -- 12.11 Staff awareness training -- 12.12 Comprehensive risk management programme…”
Published 2020
Connect to this title online (unlimited users allowed)
Electronic eBook -
539
-
540