Academic literature on the topic 'Comprehensive security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Comprehensive security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Comprehensive security"

1

Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1,2 (October 2015): 13–34. http://dx.doi.org/10.11610/isij.3301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sweijs, Tim. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1,2 (October 2015): 5–9. http://dx.doi.org/10.11610/isij.3300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yushmanov, Anton А. "DEVELOP A COMPREHENSIVE SECURITY SYSTEM." Interexpo GEO-Siberia 7, no. 1 (July 8, 2020): 140–48. http://dx.doi.org/10.33764/2618-981x-2020-7-1-140-148.

Full text
Abstract:
The article describes the process of developing an integrated security system based on a single-board NVIDIA Jetson Nano computer. The main objective of the system is to provide profiled access to the room for trusted users. As a result of the work, a face recognition mechanism based on the convolutional neural network was designed and implemented. Face detection is implemented using histograms of directional gradients. Then, thе face is centered and processed by the trained convolutional neural network, out the characteristic features of the image supplied to the image classifier, which gives the percentage of image matching with the reference images. In the process of implementing the system, a framework was developed that allows implementing a complex security system, regardless of hardware components. To ensure the protection of the room, smoke detectors, opened doors and windows were added to the system. The scientific novelty of tht work is the encapsulation of all transmitted system traffic to overlay networks to ensure confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
4

Dewitt, David. "Common, comprehensive, and cooperative security." Pacific Review 7, no. 1 (January 1994): 1–15. http://dx.doi.org/10.1080/09512749408719067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rix, Alan. "Japan's comprehensive security and Australia." Australian Outlook 41, no. 2 (August 1987): 79–86. http://dx.doi.org/10.1080/10357718708444936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Watt, Steve. "Computer security — comprehensive controls checklist." Computer Fraud & Security Bulletin 10, no. 4 (February 1988): 15–16. http://dx.doi.org/10.1016/0142-0496(88)90084-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gasper, Des, and Oscar A. Gómez. "Human security thinking in practice: ‘personal security’, ‘citizen security' and comprehensive mappings." Contemporary Politics 21, no. 1 (January 2, 2015): 100–116. http://dx.doi.org/10.1080/13569775.2014.993906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Correa Chica, Juan Camilo, Jenny Cuatindioy Imbachi, and Juan Felipe Botero Vega. "Security in SDN: A comprehensive survey." Journal of Network and Computer Applications 159 (June 2020): 102595. http://dx.doi.org/10.1016/j.jnca.2020.102595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Westing, Arthur H. "Comprehensive Human Security and Ecological Realities." Environmental Conservation 16, no. 4 (1989): 295. http://dx.doi.org/10.1017/s037689290000967x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shabtai, A., Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. "Google Android: A Comprehensive Security Assessment." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 35–44. http://dx.doi.org/10.1109/msp.2010.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Comprehensive security"

1

Feffer, Antonia Lynn. "Comprehensive security strategy for all-optical networks." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99866.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 107-109).
Optical networking is a powerful means of communication in modem times of high bandwidth demands and high data speeds. While developments in optical networking continue to progress, however, the security implications they create have not yet caught up. In this thesis, we characterize a selection of damaging attacks against optical networks. By providing a detailed description of the attacks, we are also able to better understand their effects across the different layers of the network model. We also propose the current best practices for sensing and detection of these attacks when they occur, as well as mitigation techniques to limit the damage they incur. The attacks are not fully eliminated, however, and so we also identify remaining vulnerabilities these attacks can exploit. After characterizing the attacks, we propose a method for diagnosing attacks as they occur within a network given the analysis we have conducted. We also propose an algorithm for diagnosing attacks, as well as a monitoring system framework that relies on the establishment of autonomous zones of the network in order to efficiently limit damage and quarantine problem areas from the rest of the healthy network. This framework can be applied to a wide variety of network set-ups and topologies, with the ability to customize it to fit the needs of the system.
by Antonia Lynn Feffer.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
2

Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.
Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Tong, Sui-yip. "The implementation of the policy of comprehensive social security assistance." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36449714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tong, Sui-yip, and 唐瑞葉. "The implementation of the policy of comprehensive social security assistance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36449714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zwolski, Kamil. "The EU as an international security actor : a comprehensive approach." Thesis, University of Salford, 2010. http://usir.salford.ac.uk/26986/.

Full text
Abstract:
There is a vibrant discussion in academia about the role of the European Union (EU) in international security. However, this discussion largely concentrates on the Common Security and Defence Policy (CSDP) not fully acknowledging the instruments of the European Commission. Also, the majority of publications tend to limit the analysis to more traditional security problems, whilst literature on contemporary security studies often illustrates how the security concept has broadened in the last few decades. This thesis offers an original framework to studying the EU as a security actor, by adopting the comprehensive approach. Such an approach is important in order to address two aforementioned problems in the literature. First, this thesis does not limit its analysis to the CSDP, but also looks at the role of the European Commission in developing the EU’s international security policy. Second, this thesis goes beyond traditional security problems, by including three diverse case studies: a) climate change, representing the so-called ‘non traditional’ security challenge; b) the threat of the proliferation of WMDs, in particular from Russia; and c) piracy off the Somali coast. This PhD concludes that the EU already plays a significant role as an international security actor; there are two important aspects of this role. Firstly, the analysis has demonstrated that the instruments of the European Commission, such as the Instrument for Stability, significantly complement EU policies undertaken within the framework of the CSDP. Secondly, this study has also demonstrated the importance of including the so-called ‘non-traditional’ security challenges, such as climate change, when analysing the role of the EU as a security actor. Thus, it was important to analyse EU policy in this area, alongside EU policies regarding more traditional security problems.
APA, Harvard, Vancouver, ISO, and other styles
7

Brady, Eric Bonham. "Security Analysis: A Suggested Method for a Comprehensive Top-Down Approach." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/319941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schatz, Daniel. "Towards a comprehensive evidence-based approach for information security value assessment." Thesis, University of East London, 2018. http://roar.uel.ac.uk/7950/.

Full text
Abstract:
This thesis is motivated by the goals of understanding in depth which information security value aspects are relevant in real-world business environments and contributing a value-prioritised information security investment decision model suitable for practitioners in the field. Pursuing this goal, we apply a mixed method research approach that combines the analysis of the relevant literature, expert interviews, practitioner survey data and structural equation modelling and multicriteria decision analysis. In the first step, we address the identified terminology gap to clarify the meaning of 'cyber security' by analysing authoritative definition sources in the literature and presenting an improved definition distinct from that of 'information security'. We then investigate the influence of repeated information security breaches on an organisation's stock market value to benchmark the wider economic impact of such events. We find abnormal returns following a breach event as well as weak statistical significance on abnormal returns for later breach events, confirming that data breaches have a negative impact on organisations. To understand how security practitioners view this topic, we conduct and analyse semi-structured interviews following a grounded theory approach. Our research identifies 15 principles aligned with a conceptual information security investment framework. The key components of this framework such as the business environment, drivers (threat landscape, legal and regulatory) and challenges (cost of security, uncertainty) are found to be a crucial part of value-prioritised information security investment decisions. We verify these findings through a structural model consisting of five latent variables representing key areas in value-focused information security investment decisions. The model shows that security capabilities have the largest direct effect on the value organisations gain from information security investment. In addition, the value outcome is strongly influenced by organisation-specific constructs such as the threat landscape and regulatory requirements, which must therefore be considered when creating security capabilities. By addressing one of the key uncertainty issues, we use a probabilistic topic modelling approach to identify latent security threat prediction topics from a large pool of security predictions publicised in the media. We further verify the prediction outcomes through a survey instrument. The results confirm the feasibility of forecasting notable threat developments in this context, implying that practitioners can use this approach to reduce uncertainty and improve security investment decisions. In the last part of the thesis, we present a multicriteria decision model that combines our results on value-prioritised information security investments in an organisational context. Based on predefined criteria and preferences and by utilising stochastic multicriteria acceptability analysis as the adopted methodology, our model can deal with substantial uncertainty while offering ease of use for practitioners.
APA, Harvard, Vancouver, ISO, and other styles
9

Al, Mayahi Ibrahim Humaid. "Development of a comprehensive information security system for UAE e-Government." Thesis, Bangor University, 2016. https://research.bangor.ac.uk/portal/en/theses/development-of-a-comprehensive-information-security-system-for-uae-egovernment(190cd7ed-2d1d-4805-963a-5f6d1dc46971).html.

Full text
Abstract:
The UAE has a vision of delivering unified e-Government services across numerous departments of seven emirates. The primary goal is to bring all aspects of the government information services online for every citizens and business by completely replacing the existing paper-based bureaucracy. This creates significant risks and information security challenges which the UAE e-Government is seeking to address. This thesis makes a comprehensive review of the UAE e-Government’s information security posture. An analysis of the current strengths and weaknesses of the e-Government was carried out, SWOT analysis was employed and based on the results, a TOWS matrix was constructed facilitating the development of new e-Government strategies to mitigate external threats. To implement an Information Security Management System (ISMS) across the e-Government departments, a framework was developed based on a multi-layered approach that is used to structure the information security program. It considers three factors; technology, operations and people (employees), to increase the effectiveness of information security system. To implement the framework, several international standards were evaluated and subsequently the ISO 27001 standard was used as a benchmark for achieving a secure e-Government. A Gap Analysis was carried out to evaluate the current state of the security culture within the e-Government against the standard and a Risk Assessment was carried out to demonstrate the existing risks faced by e-Government services. A comprehensive series of penetration tests were commissioned on e-Government network infrastructure. Having made interventions to improve the security of physical information technologies and organisational operations, a comprehensive questionnaire was developed to obtain quantitative evaluation of the security culture within the organisation. Subsequently, a training programme was devised and developed for the employees to demonstrably improve the security culture as measured by this approach. Finally, the findings, in conjunction with a consultation with security heads within the UAE e-Government, are used to construct a single comprehensive information security policy that can be rolled out to all e-Government departments within the seven emirates.
APA, Harvard, Vancouver, ISO, and other styles
10

Klenke, Carsten. "Japan's comprehensive National Security and the European Union's Common Foreign and Security Policy convergence towards global cooperation? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380827.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2000.
Thesis advisor(s): Olsen, Edward A. ; Abenheim, Donald. "June 2000." Includes bibliographical references (p. 97-101). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Comprehensive security"

1

Comprehensive Security Dialogue Project (South Asia), ed. Comprehensive security, environmental dimensions: Comprehensive Security Dialogue Project. New Delhi: Delhi Policy Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sullivan, Leonard. Comprehensive security and western prosperity. Lanham, MD: University Press of America, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Westing, Arthur H. From Environmental to Comprehensive Security. Heidelberg: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00687-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Centre for Land Warfare Studies (New Delhi, India), ed. Security deficit: Comprehensive internal security strategy for India. New Delhi: Centre for Land Warfare Studies, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wittkop, Jeremy. Building a Comprehensive IT Security Program. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2053-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liyanage, Madhusanka, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, and Mika Ylianttila, eds. A Comprehensive Guide to 5G Security. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Centre for Air Power Studies (New Delhi, India). Comprehensive security for an emerging India. New Delhi: KW Publishers, in association with Centre for Air Power Studies, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

India) Centre for Security Analysis (Chennai. Seminar proceedings, women and comprehensive security. Chennai: Centre for Security Analysis, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Biederlack, Lisa. Comprehensive food security & vulnerability analysis (CFSVA): Ghana. Rome, Italy: United Nations World Food Programme, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dipankar, Banerjee. Security in South Asia: Comprehensive and cooperative. New Delhi: Manas Publications, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Comprehensive security"

1

Ahn, Se Hyun. "Comprehensive Security." In Policing Northeast Asia, 35–72. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5116-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Husain, Javid. "Toward Comprehensive Security." In Pakistan and a World in Disorder, 171–82. New York: Palgrave Macmillan US, 2016. http://dx.doi.org/10.1057/978-1-137-59962-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ma, Yuxiang, Yulei Wu, and Jingguo Ge. "A Comprehensive Survey." In Accountability and Privacy in Network Security, 11–25. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6575-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "IoT Security: A Comprehensive View." In Intelligent Systems Reference Library, 467–94. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33596-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martis, Maria, Namratha V. Pai, R. S. Pragathi, S. Rakshatha, and Sunanda Dixit. "Comprehensive Survey on Hadoop Security." In Emerging Research in Computing, Information, Communication and Applications, 227–36. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6001-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Deck, Richard A. "Singapore: Comprehensive Security — Total Defence." In Strategic Cultures in the Asia-Pacific Region, 247–69. London: Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1007/978-1-349-27342-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khozin, G. "Space Activity and Comprehensive Security." In Space of Service to Humanity, 39–47. Dordrecht: Springer Netherlands, 1997. http://dx.doi.org/10.1007/978-94-011-5692-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Monshizadeh, Mehrnoosh, and Vikramajeet Khatri. "IoT Security." In A Comprehensive Guide to 5G Security, 245–66. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Laurenza, Giuseppe, and Riccardo Lazzeretti. "dAPTaset: A Comprehensive Mapping of APT-Related Data." In Computer Security, 217–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Sooyeon, and Huy Kang Kim. "ADSaS: Comprehensive Real-Time Anomaly Detection System." In Information Security Applications, 29–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Comprehensive security"

1

Boulware, Douglas, John Salerno, Richard Bleich, and Michael L. Hinman. "Toward building a comprehensive data mart." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Guodi, Tong Li, Hao Yue, Zhen Yang, and Runzi Zhang. "Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis." In 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2021. http://dx.doi.org/10.1109/compsac51774.2021.00103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rm, Manikandan, and D. Radha. "A Comprehensive Approach for Network Security." In 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018. http://dx.doi.org/10.1109/icicct.2018.8472952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uppuluri, Prem, and Jeff Pittges. "A Comprehensive Undergraduate Application Security Project." In 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012. http://dx.doi.org/10.1109/itng.2012.127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Basinya, Evgeny A., and Anton A. Yushmanov. "Development of a Comprehensive Security System." In 2019 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2019. http://dx.doi.org/10.1109/dynamics47113.2019.8944700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Zhiyuan, Mingwen Wang, Xueqiang Yan, Yueming Yin, and Zhigang Luo. "A comprehensive security architecture for SDN." In 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN). IEEE, 2015. http://dx.doi.org/10.1109/icin.2015.7073803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Suthar, Dharmin, and Parag H. Rughani. "A Comprehensive Study of VoIP Security." In 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 2020. http://dx.doi.org/10.1109/icacccn51052.2020.9362943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Wenzheng, and Hongdan Zhu. "Research on Comprehensive Enterprise Network Security." In 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2021. http://dx.doi.org/10.1109/iceiec51955.2021.9463823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Desjardins, Daniel D., Darrel G. Hopper, Peter L. Marasco, James C. Byrd, and Jon Neubauer. "Military display market: fourth comprehensive edition." In Defense and Security Symposium, edited by James C. Byrd, Daniel D. Desjardins, Eric W. Forsythe, and Henry J. Girolamo. SPIE, 2006. http://dx.doi.org/10.1117/12.663675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Macior, Robert E., Steven M. Mercurio, Sharon M. Walter, Sheila W. Rakowski, Mark P. Kozak, and Michael P. Blount. "A comprehensive simulation environment for sensor fusion." In Defense and Security Symposium, edited by Kevin Schum and Alex F. Sisti. SPIE, 2006. http://dx.doi.org/10.1117/12.665060.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Comprehensive security"

1

Vigil, Robyn Ashlee. Los Alamos National Laboratory Comprehensive Security Briefing. Office of Scientific and Technical Information (OSTI), March 2019. http://dx.doi.org/10.2172/1501784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yamanoue, Testsuro. Japan's Comprehensive Grand Security Strategy in East Asia. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Draelos, T. J., and R. L. Craft. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes. Office of Scientific and Technical Information (OSTI), March 1996. http://dx.doi.org/10.2172/243017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Murphy, Sandra. Comprehensive Routing Security Development and Deployment for the Internet. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada619115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dahlman, Ola, Jenifer Mackby, Bernard Sitt, Andre Poucet, Arend Meerburg, Bernard Massinon, Edward Ifft, Masahiko Asada, and Ralph Alewine. Container Security: A Proposal for a Comprehensive Code of Conduct. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada434718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chester, Kemp L. A Common Vision for the Common Defense: Toward a More Comprehensive National Security Strategy. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada394249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ayyar, Balan R. The Impact of the Comprehensive Test Ban Treaty on Nuclear Non-Proliferation and American Security. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada388607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zastrow, Roderick C. From Islands to Networks: A Blueprint for a Comprehensive US Security Strategy in the Asia-Pacific Region. Fort Belvoir, VA: Defense Technical Information Center, May 2002. http://dx.doi.org/10.21236/ada420754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Erkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.

Full text
Abstract:
This report describes the effects of climate change for Finland from the view of comprehensive security. The report examines both direct and indirect climate security risks as well as transition risks related to climate change mitigation. The report is based on previous research and expert interviews. Direct security risks refer to the immediate risks caused by the changing nature of natural hazards. These include the risks to critical infrastructure and energy systems, the logistics system, health and food security. Indirect security risks relate to the potential economic, political and geopolitical impacts of climate change. Climate change can affect global migration, increase conflict risk, and cause social tensions and inequality. Transition risks are related to economic and technological changes in energy transition, as well as political and geopolitical tensions and social problems caused by climate change mitigation policies. Reducing the use of fossil fuels can result in domestic and foreign policy tensions and economic pressure especially in locations dependent on fossil fuels. Political tension can also increase the risks associated with hybrid and information warfare. The security effects of climate change affect all sectors of society and the Finnish comprehensive security model should be utilized in preparing for them. In the short run, the most substantial arising climate change related security risks in Finland are likely to occur through indirect or transition risks. Finland, similar to other wealthy countries, has better technological, economic and institutional conditions to deal with the problems and risks posed by climate change than many other countries. However, this requires political will and focus on risk reduction and management.
APA, Harvard, Vancouver, ISO, and other styles
10

Research Institute (IFPRI), International Food Policy. Comprehensive typology for food and nutrition security interventions, with application to the rural territories of the Democratic Republic of the Congo (DRC). Washington, DC: International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/1037800844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography