To see the other types of publications on this topic, follow the link: Security guide.

Dissertations / Theses on the topic 'Security guide'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 29 dissertations / theses for your research on the topic 'Security guide.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gjercek, Albin, and Alexander Andersson. "Wireless Security, a practical guide." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21570.

Full text
Abstract:
Wireless networks are continuing to grow around the world due to the advantages it offers and all the different services that it provides. In networking environments where the communication goes through a wireless connection, the importance of protecting the private information is a very significant task for network administrators. Beside the great benefits from having this type of network, the major issue of wireless communications is the weak security it provides. Companies and business organizations are more and more involved with the use of wireless networks because of the flexibility, mobility and the scalability it offers, but they are also concerned about the consequences of having a weaker security to protect their expensive investments and information. This thesis discusses the issues behind the security of wireless networks. It explains the background of the wireless networks and describes how the different security algorithms and encryptions work. The authors of this thesis decided to present some of the possible attacks that could occur in wireless networks and also give some security solutions to help others protect their network. The group that worked together on this project had the idea of investigating how secure the actual wireless algorithms and encryptions are. The approach of finding the necessary information for presenting the results and conclusions was to perform penetration tests on wireless networks that were implemented with the three famous security algorithms of WEP, WPA and WPA2. The penetrations tests were performed in lab environments and in home networks with the use of cracking tools. The group used the open source Linux based distribution called BackTrack 5. This operating system provided the group the different cracking tools that would help them perform their investigation. The purpose of performing the penetration tests was to find out the vulnerabilities that each of the security algorithms poses and therefore be able to determine which of them offers the best protection to a wireless network. After the penetration tests were done, the group came up with some solutions by configuring a wireless network with the strongest security options. The solutions were aimed to help others how to configure a specific wireless network in a simple but effective way. The results indicated that the weakest security algorithm would present some major issues for a wireless network. It included a greater possibility of experiencing different network attacks by configuring a wireless network with a weak security algorithm. Overall, this thesis provided the group the necessary information that was beneficial for them to understand how strong a wireless network actually is, and how a penetration test was performed.
APA, Harvard, Vancouver, ISO, and other styles
2

Clarinsson, Richard, and Samuel Magnusson. "The PHP programmer`s guide to secure code." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-492.

Full text
Abstract:

Abstract

Security threats against computer systems are a big problem today which also includes PHP made applications. The report is focused on protection with the help of code and not how you protect a web server. Its purpose is not to educate the readers of the thesis how to make a PHP application, the purpose is how to program a safer PHP application. The thesis contains information about common security threats against PHP scripts. It contains in most cases examples of what an attack can look like and how a protection for that example can be achieved. We have tested all code examples if they work by installing our own server with the configurations according to the delimitations of the thesis and putting up small PHP applications, which we have attacked and then protected. The contents and result of this thesis can benefit developers that use PHP as a programming language for creating web applications, by giving them information about common threats and protection.

APA, Harvard, Vancouver, ISO, and other styles
3

Criswell, Deanne B. "Homeland Security : Developing National Doctrine to Guide State Strategy Development." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6783.

Full text
Abstract:
Approved for public release; distribution is unlimited
If one subscribes to the belief that doctrine is a common understanding of what fundamental principles guide an organization, then this thesis demonstrates that there is currently no common understanding of homeland security. There is currently a lack of institutional doctrine that can be applied nationally for state level government to develop their homeland security strategies. The military has a long history of successfully using doctrine to develop war-fighting strategy. Comparisons can be made to the Air Forces use of doctrine to gain autonomy as well as the effect joint doctrine has on achieving unity of effort across disciplines. Additional lessons can be learned from past civil defense attempts at institutionalization and the evolution to emergency management and homeland security. By modeling of these existing, known and accepted doctrines or lack thereof, a national homeland security doctrine could emerge.
APA, Harvard, Vancouver, ISO, and other styles
4

Broughton, Hubert Lee. "Combating terrorism: a guide for U.S. Naval forces afloat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1985. http://handle.dtic.mil/100.2/ADA164863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moreira, Katia Beatris Rovaron. "Diretrizes para projeto de segurança patrimonial em edificações." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/16/16132/tde-17052010-090837/.

Full text
Abstract:
O objetivo do presente estudo é fazer um levantamento da aplicação das medidas de segurança patrimonial nas edificações. A paisagem urbana tem se modificado ao longo das últimas décadas em virtude de intervenções executadas para proteção pessoal e do patrimônio. Estas modificações têm sido executadas com ausência de metodologias, legislação e normalização sobre o assunto. Ao longo da dissertação são discutidas as modificações arquitetônicas em face da violência urbana e a necessidade da participação efetiva do arquiteto no processo de planejamento da segurança patrimonial. Por meio desta pesquisa, busca-se conhecer as metodologias existentes para a elaboração do projeto a fim de obter diretrizes mínimas para o planejamento da segurança. Demonstra-se que para a elaboração de um projeto são necessários levantamentos de valores patrimoniais, riscos, ameaças e vulnerabilidades aos quais a edificação está sujeita, a fim de determinar com maior precisão o nível de segurança necessário. Em uma segunda etapa são levantadas medidas de proteção passiva e ativa, a fim de dar diretrizes ao arquiteto quanto às soluções e equipamentos disponíveis para aplicação em projeto, fornecendo ferramentas adequadas para a elaboração de um projeto de segurança patrimonial. Pelos levantamentos teóricos que formam a base para o estabelecimento do nível de segurança e do conhecimento das medidas que podem ser aplicadas, é possível elaborar um projeto com maior funcionalidade e eficácia.
The urban landscape has been modified along the last few decades because of interventions made aiming at personal and asset protection. These modifications have occurred without any kind of methodology, legislation and normalization in this regard. The objective of the present study is to do a theoretical and methodological survey as well as a survey of the application practice of security measures in buildings. The architectural modifications due to urban violence and the need of the participation of architects in the process of security planning are discussed along this dissertation. Through this research, we try to find out the existent methodologies in order to develop basic guidelines for security planning. It was proven that in order to elaborate a design it is necessary to make surveys of the patrimonial values and of the risks and vulnerabilities to which the building is subject to, in order to determine with high accuracy the necessary security levels. This research tries to show to the architect the importance of his/her contribution in determining the adoption of measures of passive and active protection as well as supplying the basic tools for its application in the design. The knowledge of the theoretical base for determining the necessary safety level and measures that can be applied allows the architect to elaborate a design with more functionality and effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
6

Lambert, Reiner W. "Budget execution a management guide for Naval Security Group Commanding Officers, Officers in Charge and Department Heads /." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA245985.

Full text
Abstract:
Thesis (M.S. in Financial Management)--Naval Postgraduate School, December 1990.
Thesis Advisor(s): Eberling, Glenn D. Second Reader: Moses, Doug. "December 1990." Description based on title screen as viewed on March 31, 2010. DTIC Identifier(s): Naval Budgets, Naval Security Group Commanding Officers, OIC (Officer In Charge), DH (Department Heads), Budget Execution. Author(s) subject terms: Budget Execution, Management, Naval Security Group, Accounting, Operating Budget, Operating Target. Includes bibliographical references (p. 7). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Djurberg, Siri, and Antonia Miocic. "Molntjänster för svenska sjukvårdsorganisationer : En guide för behandling av patientdata." Thesis, Uppsala universitet, Informationssystem, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356409.

Full text
Abstract:
Molntjänster har redan tagit över flera branscher och sjukvården står näst på tur. Molntjänsters effektiviseringar lockar sjukvården som är en hård pressad bransch både inom kompetens och tid. Samtidigt ansvarar sjukvården över patientdata vilket leder till att de har strikta lagar och regelverk att följa som innebär stora utmaningar. Det kan vara svårt att få en holistisk bild av vad molntjänster kan erbjuda sjukvårdsorganisationen och därför har vårdens syn på molntjänster undersökts och vilka faktorer som präglat deras hantering av patientdata i molnet. En kvalitativ studie har genomförts och där respondenter som är IT-ansvariga både på sjukvårdsorganisationer och molnleverantörer har intervjuats. Sammanfattningsvis dras slutsatsen att i IT-ansvariga på sjukvårdsorganisationer ser molntjänster som en möjlighet och en väg som de måste tas. För att kunna möta patienters behov är de överens om att sjukvården kommer behöva möta deras patienter på en digital plattform och att det krävs tydliga gemensamma riktlinjer för hur man som sjukhusorganisation bör agera vid beslutstagande av molntjänster från en molnleverantör. Det är av intresse att en myndighet upprättas för att ta fram dessa lagar och riktlinjer i syfte att vara rådgivare och inte granskande. Slutligen presenteras sex stycken punkter, som enligt respondenterna, präglar hantering av patientdata i molntjänster som är riktade till de beslutsfattande och IT-ansvariga som är involverade i de beslut som ska fattas kring användandet av molntjänster inom sjukvårdsorganisationer.
APA, Harvard, Vancouver, ISO, and other styles
8

Mikulová, Aneta. "Management informační bezpečnosti ve zdravotnickém zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223234.

Full text
Abstract:
The topic of my thesis is "Information security management in healthcare organization." Medical facilities are generally the ones who should put emphasis on information security. For my thesis I chose aesthetic private clinic called Visage, I underwent safety analysis. The analysis showed that only a small part of the security process is documented in the clinic. This is particularly deficient in terms of business. There may be a leak of sensitive information on the health status of individual patients. It is necessary to better treat the handling of these data. The aim of this thesis is a security manual that will describe the personal, physical and IT security.
APA, Harvard, Vancouver, ISO, and other styles
9

Trtílek, Ivo. "Uplatnění managementu bezpečnosti informací ve veřejné správě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224216.

Full text
Abstract:
The diploma thesis deals with an application of information security management system in the organization of public administration and local government. It defines important terms and describes the best practices which are compliant with the ISO/IEC 27000. It contains draft of security manual that can be used as an organization tool for human resources security, IT and physical and environmental security of the organization.
APA, Harvard, Vancouver, ISO, and other styles
10

Bauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.
Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
11

Sauvage-Vincent, Jean. "Les modes de plasmon sur film métallique ondulé, appliqués aux documents de sécurité." Phd thesis, Université Jean Monnet - Saint-Etienne, 2013. http://tel.archives-ouvertes.fr/tel-01068070.

Full text
Abstract:
La présente thèse se propose de résoudre les problématiques de facilités de contrôle optique d'un document de sécurité pourvu d'un hologramme par l'application d'une structure optique complexe mettant en œuvre les modes de plasmons de surface. Dans une partie dédiée nous démontrerons l'adaptation de la transmission extraordinaire plasmonique à travers une couche métallique continue ; un concept de sécurité sera aussi présenté permettant l'observation et l'authentification de l'effet transmissif. Dans une autre partie nous présentons un effet de réflexion plasmonique extraordinaire. En lieu et place des phénomènes classiques d'absorption sur une couche métallique épaisse, nous présentons un phénomène que nous avons nommé balance énergétique à médiation plasmonique. Cet effet est bien évidemment mis en évidence à travers un concept final adapté au domaine de l'optique de sécurité
APA, Harvard, Vancouver, ISO, and other styles
12

Patton, Mark B. "A case study of Internet Protocol Telephony implementation at United States Coast Guard headquarters." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FPatton.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2005.
Thesis Advisor(s): Dan C. Boger, R. Scott Coté. Includes bibliographical references (p. 134-138). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
13

Szubartowicz, Eva [Verfasser], Guido [Akademischer Betreuer] Schryen, and Günther [Akademischer Betreuer] Pernul. "Planning and Evaluation of Information Security Investments / Eva Szubartowicz ; Guido Schryen, Günther Pernul." Regensburg : Universitätsbibliothek Regensburg, 2018. http://d-nb.info/1165869055/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yasasin, Emrah [Verfasser], Guido [Akademischer Betreuer] Schryen, and Günther [Akademischer Betreuer] Pernul. "Decision Problems in Information Security: Methodologies and Quantitative Models / Emrah Yasasin ; Guido Schryen, Günther Pernul." Regensburg : Universitätsbibliothek Regensburg, 2018. http://d-nb.info/1173974717/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Schmitz, Guido [Verfasser], and Ralf [Akademischer Betreuer] Küsters. "Privacy-preserving web single sign-on : formal security analysis and design / Guido Schmitz ; Betreuer: Ralf Küsters." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2019. http://d-nb.info/1211649679/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Staicu, Cristian-Alexandru [Verfasser], Guido [Akademischer Betreuer] Salvaneschi, Michael [Akademischer Betreuer] Pradel, and Andrei [Akademischer Betreuer] Sabelfeld. "Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications / Cristian-Alexandru Staicu ; Guido Salvaneschi, Michael Pradel, Andrei Sabelfeld." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2020. http://d-nb.info/1213027012/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Staicu, Cristian-Alexandru [Verfasser], Guido Akademischer Betreuer] Salvaneschi, Michael [Akademischer Betreuer] [Pradel, and Andrei [Akademischer Betreuer] Sabelfeld. "Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications / Cristian-Alexandru Staicu ; Guido Salvaneschi, Michael Pradel, Andrei Sabelfeld." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2020. http://d-nb.info/1213027012/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Oberle, John P. "Japanese-U.S. missile defense : stepping stone towards normalization /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FOberle.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Edward A. Olsen, H. Lyman Miller. Includes bibliographical references (p. 89-95). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
19

Marissal, Alain. "Collision bidimensionnelle dans les transports guidés : Expérimentation et modélisation des risques de chevauchement." Valenciennes, 1993. https://ged.uphf.fr/nuxeo/site/esupversions/a3c3014d-5275-41b2-bd52-4225197636b6.

Full text
Abstract:
Dans le domaine de la collision de véhicules de transports guidés, le chevauchement est considéré comme la conséquence du choc frontal la plus dramatique pour la sécurité des passagers. La définition de nouvelles méthodes de conception des véhicules de transports guidés est alors nécessaire afin de minimiser les conséquences d'une collision sur les voyageurs. Afin de mieux comprendre les phénomènes physiques du chevauchement, nous avons expérimenté la collision d'une rame de véhicules contre une rame de véhicules à l'arrêt. Cet essai de choc représente une source de résultats que nous utilisons pour confronter et valider les modèles globaux et locaux. Le modèle global est base sur la dynamique plane non linéaire des systèmes multi-corps rigides articules. Les grandes déformations plastiques sont modélisées par des ressorts et amortisseurs non linéaires et des liaisons cinématiques. Cet outil de calcul est utilisé pour pre-dimensionner les paramètres qui ont une influence sur les risques de chevauchement et les efforts verticaux. Le modèle local met en œuvre la méthode des éléments finis. Ce modèle est conçu pour étudier la réponse dynamique en grandes déformations des structures non linéaires tridimensionnelles. Dans une stratégie de conception, le couplage des méthodes globale et locale est une nécessité d'autant plus que les modèles locaux sont fortement sensibles à la finesse des maillages utilises. Les deux confrontations ont donc permis de montrer que les modèles globaux et locaux étaient des outils adaptés respectivement aux stades de la pré-conception et de la conception des véhicules de transports guides lors d'un choc frontal avec chevauchement.
APA, Harvard, Vancouver, ISO, and other styles
20

DARRICAU, MYRIAM. "Contribution a la reutilisation de connaissances pour l'aide a l'elaboration et a l'evaluation des specifications de logiciels : application a la securite des systemes de transport guides." Paris 6, 1999. http://www.theses.fr/1999PA066139.

Full text
Abstract:
La phase d'interpretation des besoins de l'utilisateur en specifications de logiciel repose en grande partie sur l'experience et le savoir faire des experts du domaine. Cette phase constitue actuellement le talon d'achille du developpement d'un logiciel, car elle conditionne l'ensemble des phases avales de realisation et d'evaluation du logiciel. L'approche suivie pour apporter un element de reponse a ce probleme, repose essentiellement sur la reutilisation des connaissances contenues dans differents dossiers de specifications de logiciels deja valides et certifies. Cette demarche a debouche sur la construction d'une base de specifications en deux phases complementaires. La premiere phase consiste a amorcer la base a l'aide d'un modele de specifications. Ce modele est issu de l'acquisition et de la structuration de connaissances communes a differentes specifications. Il est represente par des graphes conceptuels desowa. La seconde phase de construction de la base de specifications consiste a enrichir la base en utilisant le modele comme format d'acquisition de nouvelles specifications. Afin de montrer la faisabilite de l'approche proposee, nous avons focalise nos travaux sur un probleme representatif du domaine de la securite des transports guides : le systeme de pilotage automatique. L'approche proposee a ete mise en uvre au sein d'une maquette informatique permettant de reutiliser les connaissances de la base de specifications afin d'aider, d'une part a elaborer de nouvelles specifications, et d'autre part, a evaluer des specifications existantes.
APA, Harvard, Vancouver, ISO, and other styles
21

Sung, Hsieh Chih, and 謝志松. "Wireless LAN Security Guide of Study." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/72141812041243127113.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊管理系
93
The WLANs is more and more popular in the Internet environment, since it is the very convenient network. Following this trend, the security of WLAN is also more and more important, causing that the information security society is focusing on the WLANs security right now. According to the statistics in the Taiwan government, about 60% Taiwan WLANs user don’t consider the security issue. Also many intruding events in the WLANs network happened in the last year. These things cause the personnel and company information security is more and more serious, so I want to develop a security standard to provide them to refer. For this standard, I begin from studying some document, and then analyze WLANs security mechanism, management operation, security technology, and security requirement. After thinking and concluding some results, I establish the WLANs network security standard and also build up the self-examination list. This list can guide the government and personnel to install a security environment or to be a reference. Finally the practicability of the WLANs network security standard is discussed. I adopt the requirement of the mobile office network as my model, and use threat analysis, security police and security structure to build up the self-examination list.
APA, Harvard, Vancouver, ISO, and other styles
22

Mignault, Sylvain. "L'audit de sécurité et la protection des organisations." Thèse, 2009. http://hdl.handle.net/1866/7395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Barbosa, João Fernando da Costa Meireles. "Automated Repair of Security Vulnerabilities using Coverage-guided Fuzzing." Dissertação, 2021. https://hdl.handle.net/10216/135943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Barbosa, João Fernando da Costa Meireles. "Automated Repair of Security Vulnerabilities using Coverage-guided Fuzzing." Master's thesis, 2021. https://hdl.handle.net/10216/135943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wimmel, Guido Oliver [Verfasser]. "Model-based development of security-critical cystems / Guido Oliver Wimmel." 2005. http://d-nb.info/979096634/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Krantz, Amanda Ebitz David. "The effects of security guards and gallery guides on visitor experience at the Solomon R. Guggenheim Museum." 2009. http://etda.libraries.psu.edu/theses/approved/PSUonlyIndex/ETD-3986/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

OPOKU, EFUA BABOA. "Human Rights Violations under the Guise of Counter-Terrorism Measures: A Question of Reconciling Security Concerns and Protecting the Fundamental Right to Life." Thesis, 2011. http://hdl.handle.net/1974/6815.

Full text
Abstract:
Both security and human rights are important to all within the civilized world. Yet there are some serious tensions between the two political norms. For instance, it may not be easy for a state or the international community to reconcile well intentioned acts to maintain security and to preserve human rights. In the recent past, such a difficulty has been played out not only in the events, but also in the aftermath of the September 11, 2001 terrorist attacks in the United States. The result of the attacks, culminating in the massive loss of lives and property, has been in the adoption of various international treaties and domestic laws that have swiftly been enacted and deployed to counter terrorism, and the development of a concept of a state of “urgency” that appears to shadow the obligation to protect fundamental human rights, particularly the right to life under international law. This thesis thus focuses on the promotion and protection of fundamental human rights, particularly, the right to life with the subsequent declaration of the “war on terror” by the United States. The work targets the debate between security and human rights in the light of terrorism post 9/11, highlights the impact of choosing one ideal over another, and eventually rationing out a balance that would serve as a threshold for upholding standards in both security and human rights in the face of terrorism threats. Essentially, however, this thesis is hinged on the argument that to allow the ideal of security which apparently appears advantageous to a “continuing state of urgency” to overwhelmingly influence the implementation of counter-terrorism measures while paying no attention to the fundamental right to life would constitute a paradox in combating terrorism. I posit that the result of the above exercise, if chosen, implies more tragic consequences when implemented than the singular acts of terrorism in themselves.
Thesis (Master, Law) -- Queen's University, 2011-10-03 13:40:21.534
APA, Harvard, Vancouver, ISO, and other styles
28

"Yehezkel Lein ; Alon Cohen-Lifshitz: Under the guise of security. Routing the Separation Barrier to Enable the Expansion of Israeli Settlements in the West Bank / [Rezension]." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2011/5643/.

Full text
Abstract:
rezensiertes Werk: Lein, Yehezkel ; Cohen-Lifshitz, Alon: Under the guise of security. Routing the Separation Barrier to Enable the Expansion of Israeli Settlements in the West Bank. - BIMKOM (Planners for Planning Rights) ; B'Tselem (The Israeli Information Center for Human Rights in the Occupied Territories), 2005. ISSN 0793-S20X.
APA, Harvard, Vancouver, ISO, and other styles
29

Quigg, Gary Francis. "JB-2: America's First Cruise Missile." Thesis, 2014. http://hdl.handle.net/1805/5517.

Full text
Abstract:
My research provides a historical and archaeological context for this thesis, in which I argue the JB-2 missile is historically significant as a unique example of the rapid duplication of enemy technology for both physical and psychological retaliation, as a crucial link in the chain of development for America’s cruise missile program, and for its role in early Cold War deterrence. Jet Bomb model number 2 (JB-2), America’s first operationally successful, mass produced cruise missile, developed as a direct copy of the German V-1, with slight variation in manufacture due to differences between German and American components, machinery and tooling. Continuing modifications of the JB-2 during its service life led to improvements in performance, control, and accuracy. From 1944 to 1953, the JB-2 transitioned from a weapon quickly prepared for wartime deployment to an essential test vehicle for the United States Army, Air Force and Navy while supporting the U.S. policy of containment during the early Cold War.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography