Books on the topic 'Security International – Korea'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security International – Korea.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Divided Korea: Toward a culture of reconciliation. University of Minnesota Press, 2005.
Find full textNo exit: North Korea, nuclear weapons, and international security. International Institute for Strategic Studies, 2011.
Find full textStraub, David, Gi-Wook Shin, and Pyŏng-gwan Kim. Beyond North Korea: Future challenges to South Korea's security. Walter H. Shorenstein Asia-Pacific Research Center, 2011.
Find full textDefiant failed state: The North Korean threat to international security. Potomac Books, 2010.
Find full textNational Defense University. Center for Strategic Research, ed. Redefining success: Applying lessons in nuclear diplomacy from North Korea to Iran. National Defense University Press, 2010.
Find full textHungry for peace: International security, humanitarian assistance, and social change in North Korea. United States Institute of Peace Press, 2006.
Find full textChong-nyul, Yi. Korea and the world in transition: A collection of essays and speeches. Tomorrow Pub. Co., 1990.
Find full textICISC 2000 (2000 Seoul, Korea). Information security and cryptology: ICISC 2000, third international conference, Seoul, Korea, December 8-9, 2000 : proceedings. Springer, 2001.
Find full textP, Petitcolas Fabien A., and Kim Hyoung Joong 1954-, eds. Digital watermarking: First International Workshoip, IWDW 2002, Seoul, Korea, November 21-22, 2002 : revised papers. Springer, 2003.
Find full textICISC 2009 (2009 Seoul, Korea). Information security and cryptology-- ICISC 2009: 12th international conference, Seoul, Korea, December 2-4, 2009 : revised selected papers. Springer, 2010.
Find full textInternational, Conference on Information Science and Security (2008 Seoul Korea). Proceedings of the International Conference on Information Science and security: January 10-12, 2008, Seoul, Korea. IEEE Computer Society, 2007.
Find full textKil-Hyun, Nam, and Rhee Gwangsoo, eds. Information security and cryptology - ICISC 2007: 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings. Springer, 2007.
Find full textJooSeok, Song, ed. Information security and cryptology--ICISC'99: Second international conference, Seoul, Korea, December 9-10, 1999 : proceedings. Springer, 2000.
Find full textSehun, Kim, Yung Moti, and Lee Hyung-Woo, eds. Information security applications: 8th international workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007 : revised selected papers. Springer, 2007.
Find full textYoum, Heung Youl. Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2009.
Find full textKyŏng-bae, Min, ed. Tongbuga pŏpche hyŏmnyŏk kwa Pukhan ŭi ch'eje chŏnhwan: Kwaje wa chŏnmang = Legislative cooperation in Northeast Asia for the transition of North Korea : challeges and prospects. Hanul Ak'ademi, 2012.
Find full textTongbuga chaep'yŏn kwa Han'guk ŭi ch'ulgu chŏllyak: Gateway strategy for Korea in reshaping northeast Asia. 21-segi Kunsa Yŏn'guso, 2011.
Find full textKongyu hach'ŏn mul anbo ch'egye kuch'ŭk ŭl wihan hyŏmnyŏk pangan: Developing a framework of water security and cooperation in transboundary rivers of South and North Korea. Han'guk Hwan'gyŏng Chŏngch'aek, P'yŏngka Yŏn'guwŏn, 2010.
Find full text1949-, Won Dongho, and Kim Seungjoo, eds. Information security and cryptology: ICISC 2005, 8th international conference, Seoul, Korea, December 1-2, 2005 : revised selected papers. Springer, 2006.
Find full textChung, Yongwha. Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textDavid, Hutchison. Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers. Springer Berlin Heidelberg, 2009.
Find full textMoti, Yung, and SpringerLink (Online service), eds. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textHoon, Lim Chae, and Yung Moti, eds. Information security applications: 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers. Springer, 2005.
Find full textDavid, Hutchison. Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers. Springer Berlin Heidelberg, 2009.
Find full textRhee, Kyung-Hyune. Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textLee, Dong Hoon. Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textChe 3-ch'a Pukhaek sirhŏm ihu ŭi Pukhaek p'ŏjŭl kwa Hanbando Amagetton. Yunidŏsŭ Chŏngbo Kaebarwŏn, 2014.
Find full textservice), SpringerLink (Online, ed. Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textInternational Conference on Security-Enriched Urban Computing and Smart Grid (1st (2010 Taejŏn-si, Korea)). Security-enriched urban computing and smart grid: First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010, proceedings. Springer, 2010.
Find full textPark, Jong Hyuk, and Jong Hyuk Park. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.
Find full textInternational Conference on Information Security and Assurance (3rd : 2009 : Seoul, Korea), ed. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.
Find full textFuqua, Jacques L. Nuclear endgame: The need for engagement with North Korea. Praeger Security International, 2008.
Find full textHudson Institute/East Asian Security Study Group Conference (1997 Tokyo, Japan). The future of Korea-Japan relations: Proceedings of the Hudson Institute/East Asian Security Study Group Conference, 1997, supported by the Center for Global Partnership of the Japan Foundation. Edited by Dujarric Robert and Kokusai Kōryū Kikin. Nichi-Bei Sentā. Hudson Institute, 2001.
Find full textJoong, Lee Pil, ed. Advances in cryptology, ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings. Springer, 2004.
Find full textSŏng-gŏl, Kim, ed. Kukpang pumun ŭi kukka sinsŏngjang tongnyŏk kanghwa pangan. Han'guk Kukpang Yŏn'guwŏn, 2010.
Find full textKim, Jungsup. International Politics and Security in Korea. Edward Elgar Publishing, 2007.
Find full textSnyder, Scott. Global Korea: South Korea's Contributions to International Security. Council on Foreign Relations Press, 2012.
Find full textKim, Ilsu. The president and international security: Korea, containment, and change. 1998.
Find full textWilliams, Phil, and Donald M. Goldstein. Security in Korea: War, Stalemate, and Negotiation (Ridgway Series in International Security Studies). Westview Pr (Short Disc), 1994.
Find full textKwak, Tae-Hwan, and Seung-Ho Joo. North Korea and Security Cooperation in Northeast Asia. Taylor & Francis Group, 2016.
Find full textNorth Korea and Security Cooperation in Northeast Asia. Taylor & Francis Group, 2014.
Find full text1958-, Cronin Patrick M., ed. Double trouble: Iran and North Korea as challenges to international security. Praeger Security International, 2008.
Find full textDouble Trouble: Iran and North Korea as Challenges to International Security. Praeger Security International General Interest-Cloth, 2007.
Find full textNorth Korea and Regional Security in the Kim Jong-un Era: A New International Security Dilemma. Palgrave Pivot, 2014.
Find full textASEAN-Korea Relations: Security, Trade, and Community Building (Proceedings of International Conferences). Institute of Southeast Asian Studies, 2007.
Find full text