To see the other types of publications on this topic, follow the link: The Concept of Security.

Dissertations / Theses on the topic 'The Concept of Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'The Concept of Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Dolan, Mark E. "The seamless maritime concept." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDolan.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2005.<br>Thesis Advisor(s): S. Starr King. Includes bibliographical references (p. 67-69). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Neville, Karen M. "IS security leveraging the concept of knowledge management." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.

Full text
Abstract:
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS rese
APA, Harvard, Vancouver, ISO, and other styles
3

Schmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Tigerstrom, Barbara J. von. "The concept of human security : some implications for international law." Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

May, Elizabeth. "Attachment security, self-concept clarity and beliefs in obsessive-compulsive disorder." Thesis, University of Hertfordshire, 2007. http://hdl.handle.net/2299/853.

Full text
Abstract:
Cognitive models of obsessive-compulsive disorder (OCD) suggest that an ambivalent self-concept and dysfunctional beliefs play an important role in the pathogenesis of OCD. Early attachment experience is argued to be the main process through which such ambivalent self-representations develop. The current study investigated self-concept clarity, a broader construct than ambivalence, attachment security, obsessive-compulsive (OC)-relevant beliefs and their relation to OC symptoms. Forty four people who reported experiencing OC symptoms were compared to 34 individuals who reported no mental healt
APA, Harvard, Vancouver, ISO, and other styles
6

Lack, Lindsey A. "Using the bootstrap concept to build an adaptable and compact subversion artifice." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FLack.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 69-71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Morrissey, Joseph Patrick. "The extension and hardware implementation of the comprehensive integrated security system concept." Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.

Full text
Abstract:
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditi
APA, Harvard, Vancouver, ISO, and other styles
8

Schmalen, Daniel. "Security Concept for VPN IPsec Site-to-Site Connections to Third Parties." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.

Full text
Abstract:
<p> VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation. </p><p> This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key find
APA, Harvard, Vancouver, ISO, and other styles
9

Zacarias, Agostinho M. "The security concept in Southern Africa : prospects for the post-apartheid era." Thesis, London School of Economics and Political Science (University of London), 1996. http://etheses.lse.ac.uk/1426/.

Full text
Abstract:
The thesis examines the concept of security that states and other actors in Southern Africa have acted upon. It argues that Southern Africa, due to its peculiar colonial history and apartheid, and the regions' links with great powers, embraced the traditional concept of security, a concept that was unsustainable and inappropriate for its specific conditions. The traditional concept seeks to protect states and domestic societies from outside threats. This concept was inherently militaristic, nationally focused, state-centric and narrow in scope. The emphasis is on immediate problem-solving rath
APA, Harvard, Vancouver, ISO, and other styles
10

Ransome, Paul Edward. "An analysis of recent changes in the concept and practice of work." Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Larsson, Sebastian. "Guarding the gates : Reassessing the concept of borders in Tanzania." Thesis, Södertörns högskola, Institutionen för livsvetenskaper, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-17178.

Full text
Abstract:
Using discourse analysis, this study will apply a critical theoretical framework and discuss how perceptions of the Tanzanian national borders compares to problematized understandings of the socially constructed concepts of borders, sovereignty, and power. For example, the Tanzanian borders will be reassessed into something creating a safe ‘inside’ opposing an unsafe ‘outside, and into something dividing territories, thus, giving birth to the identities of ‘nationality’. Furthermore, the presence of biopolitical interventions will be discussed in order to see how biopower can help increase sec
APA, Harvard, Vancouver, ISO, and other styles
12

Holford, John William. "The concept of self-defending objects and the development of security aware applications." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16227/1/John_Holford_Thesis.pdf.

Full text
Abstract:
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm, whereby those objects that encapsulate the protected resources of a security aware application (SAA), are made aware of, and responsible for, the defence of those resources. That defence takes two forms, the enforcement of mandatory access control on protected resources and the generation of the corresponding portion of the SAA's audit trail. The SDO concept acts as the philosophy that guides the application level mandatory access control within SAAs which ensures that the provided access contr
APA, Harvard, Vancouver, ISO, and other styles
13

Holford, John William. "The concept of self-defending objects and the development of security aware applications." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.

Full text
Abstract:
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm, whereby those objects that encapsulate the protected resources of a security aware application (SAA), are made aware of, and responsible for, the defence of those resources. That defence takes two forms, the enforcement of mandatory access control on protected resources and the generation of the corresponding portion of the SAA's audit trail. The SDO concept acts as the philosophy that guides the application level mandatory access control within SAAs which ensures that the provided access contr
APA, Harvard, Vancouver, ISO, and other styles
14

Busmire, Terence Edward. "Concept definitions and security requirements of a cooperative execution environment for distributed computing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Johnson, Olga. "The concept of energy security : implications of EU-Russia energy relations, 2004-2012." Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/14357/.

Full text
Abstract:
This research project presents a novel and fundamental understanding of energy security and threat perceptions by analysing the EU-Russia energy relationship concerning gas supply during the period 2004-2012. The ultimate goal of this thesis is to address the two-fold research question of why differences exist in the threat perceptions and understandings of energy security among member states of the EU, and how they affect EU’s energy stance and its gas relations with Russia. Encountering endemic problems with the coherence of EU energy policy towards Russia, the research focuses on two case s
APA, Harvard, Vancouver, ISO, and other styles
16

Hockmann, Volker. "Developing a concept for handling IT security with secured and trusted electronic connections." Thesis, University of Wolverhampton, 2014. http://hdl.handle.net/2436/324189.

Full text
Abstract:
In this day and age, the Internet provides the biggest linkage of information, personal data and information, social contact facilities, entertainment and electronic repository for all things including software downloads and tools, online books and technical descriptions, music and movies - both legal and illegal [Clarke, 1994]. With the increasing bandwidth in the last few years worldwide, it is possible to access the so-called "Triple-Play-Solutions" - Voice over lP, High-Speed-Internet and Video on Demand. More than 100 million subscribers have signed on across Asia, Europe, and the America
APA, Harvard, Vancouver, ISO, and other styles
17

Andreasson, Emelie. "All in the name of security : A qualitative content analysis regarding the concept of security in the movie Zero Dark Thirty." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7100.

Full text
Abstract:
This study explores how the concept of security is presented in current American action movies.This study will use the movie Zero Dark Thirty as an illustrative example to examine the concept ofsecurity during the ’War on Terror’-era. The study will use qualitative content analysis in order toexamine the concept of security.
APA, Harvard, Vancouver, ISO, and other styles
18

Cobb, Adam Campbell. "Changes in the concept of security since World War II among Western international theorists." Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/252234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Siko, Isaac Mohlolo. "A critical review of South Africa's approach to the concept of national security since 1994." Diss., Pretoria : [s. n.], 2007. http://upetd.up.ac.za/thesis/available/etd-01242008-121403/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Austin, William H. "The United States Department of Homeland Security concept of regionalization - Will it survive the test?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FAustin.pdf.

Full text
Abstract:
Thesis (M.S. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Robert Bach. "September 2006." Includes bibliographical references (p. 75-80). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
21

Covic, Mirjana, and Thomas Kohler. "IT security for small and medium-sized enterprises : A didactical concept of a dynamical questionnaire." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6266.

Full text
Abstract:
<p>This master thesis has been written at the School of Mathematics and System Engineering (MSI) at Växjö University in the field of computer science. IT security has become one of the main topics of every enterprise since they all use information technology in their business. Investments have to be done in order to achieve a high protection status of the IT environments. Specially small and medium-sized enterprises need more knowledge and advisory how to handle their IT security. This thesis analyses management tools that have the goal to improve the IT security. The second and main part of t
APA, Harvard, Vancouver, ISO, and other styles
22

Bude, Cristian, and Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Full text
Abstract:
Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later aspect leads to major security challenges. Today, IoT is in great need of standardization and clear architectures that descr
APA, Harvard, Vancouver, ISO, and other styles
23

Shipman-Sercu, Chris. "A False Sense of Security: The Social Security Debate." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/65.

Full text
Abstract:
My motivation to write this thesis is based on the controversy surrounding the Social Security system that has recently infiltrated the media. Through my research, I have discovered the debate concerning Social Security is not a recent development but has existed since the 1930’s. Many sources are warning citizens to no longer count on Social Security as they most likely will not receive benefits until a extremely old age if they receive benefits at all. Current retirees are fearful of either a decrease in benefits or not receiving the money they contributed to the system through the years of
APA, Harvard, Vancouver, ISO, and other styles
24

Le, Bras Jean-Baptiste. "The impact of the SSR (security sector reform) concept in shaping NATO and EU policy discourses." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/06607949001/$FILE/06607949001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hürsoy, Siret. "The new security concept and German-French approaches to the European "Pillar of Defence", 1990-2000 /." Marburg : Tectum, 2002. http://catalogue.bnf.fr/ark:/12148/cb41448411t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Holm, Linnea. "Nord Stream - Vägen till säkerhet?" Thesis, Linnaeus University, LNU, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5745.

Full text
Abstract:
<p>Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.</p><p>The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy s
APA, Harvard, Vancouver, ISO, and other styles
27

Pries, Kari Mariska. "Contested concepts and practices in security governance : evolving security approaches in El Salvador." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8070/.

Full text
Abstract:
Hope accompanied El Salvador’s peace agreements, ending 12 years of civil war. New peace and democratic renewal were expected in the tiny Central American state. Instead, extreme violence has persisted as a lived experience for individuals and a part of its state operations. Successive governments proved unable to consolidate control over the post-war crime wave. ‘Tough on crime’ public policy agendas, which included hard-handed violence-repression tactics, had little success in mitigating insecurity. In 2009, a new ex-guerrilla party, the National Liberation Front ‘Farabundo Marti’ (FMLN), wa
APA, Harvard, Vancouver, ISO, and other styles
28

Pretorius, William Richard. "The impact of the concept of decent work on the job security and the provisioning of educators." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021218.

Full text
Abstract:
Section 29(1) of the Constitution of the Republic of South Africa (the Constitution) guarantees the right to a basic education, including a basic adult education and further education. In realising this right, the State is obliged to provide financial and human resources in a manner that will transform society as a whole and deliver a better life for all citizens. The human resources in the main refer to educators. Education is one of key priorities of the present government to the extent that President Zuma has instructed that a presidential commission be established to look into the conditio
APA, Harvard, Vancouver, ISO, and other styles
29

Uzelman, Alexandra. "The transformation of the concept of the Westphalian sovereignty within the EU Common Foreign and Security Policy." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-164218.

Full text
Abstract:
The work overviews the formation process of the European integration after the end of the Cold war and also the evolution of the notion of 'the Westphalian sovereignty' in the framework of the maintenance of the EU CFSP. It is assumed that under the conditions of a political transformation of the category 'the Westphalian sovereignty' in the framework of the EU CFSP it is intensified and requires again as a special political and practical attention, as scientific elaboration in order to figure out the perspectives of the development of the EU as the whole. As the object of this work the catego
APA, Harvard, Vancouver, ISO, and other styles
30

Unkenholz, Willard L. "Command and control security: concepts and practices." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Khodadadzadeh, Omid. "Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36305.

Full text
Abstract:
This essay conducts a descriptive analysis of the ideas expressed by NATO´s official security strategy "Strategic Concept" from 2010 and the European Union’s security strategy "A Secure Europe in a Better World" from 2003. The purpose of this analysis is to examine whether the ESDP and NATO are compatible with each other when it comes to the role of security policy actor. To do so, I´ve chosen to analyse the actors' security strategies based on three dimensions. These dimensions are: Their view of the international scene, their views on cooperation and their views on how to reach security. As
APA, Harvard, Vancouver, ISO, and other styles
32

EULANO, ANTHONY CONNOR. "DYSPROSIUM: A UNITED STATES SECURITY CONCERN." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/612885.

Full text
Abstract:
This paper seeks to explore how United States dependency on foreign supplies of dysprosium affects its ability to produce and maintain current and future military defense systems. Dysprosium, one of the 17 rare earth metals, is necessary for the production of powerful permanent magnets. These magnets are used in high-tech weapon systems, such as Unmanned Aerial Vehicles. The problem is that the U.S. remains completely dependent on China for its dysprosium supply. This paper does not seek to answer the possibility or likelihood of China blocking the supply of dysprosium to the U.S. Instead, it
APA, Harvard, Vancouver, ISO, and other styles
33

Delo, Sarah. "The effects of the teacher-child relationship and caregiver attachment security on children's self-concept in middle childhood." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/401545/.

Full text
Abstract:
A positive self-concept is associated with a number of outcomes including school adjustment, academic attainment and mental health. Literature suggests individual differences in self-concept derive from children’s relationships with significant others such as parents and teachers. A systematic review of the literature exploring the relationship between teacher-child relationships and children’s self-concept found some associations, however, this was not always consistently found. Furthermore, a number of methodological limitations in the studies were noted. Implications for future research wer
APA, Harvard, Vancouver, ISO, and other styles
34

Meyer, Patrik Kristof. "Governing Muslim minorities as security treats : the case of the Uyghurs and the concept of a new Chinese nation." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Deshpande, Pranita. "Assessment Of Two Pedagogical Tools For Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.

Full text
Abstract:
Cybersecurity is an important strategic areas of computer science, and a difficult discipline to teach effectively. To enhance and provide effective teaching and meaningful learning, we develop and assess two pedagogical tools: Peer instruction, and Concept Maps. Peer instruction teaching methodology has shown promising results in core computer science courses by reducing failure rates and improving student retention in computer science major. Concept maps are well-known technique for improving student-learning experience in class. This thesis document presents the results of implementing and
APA, Harvard, Vancouver, ISO, and other styles
36

Hamark, Kindborg Johanna. "The patriarchy dressed in feminist clothes : A discourse analysis of the United Nations Security Council’s gendering of the concept Civilians." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6150.

Full text
Abstract:
This thesis analyses key documents from the United Nations Security Council (the Council) meetings during the period of 1999 to 2001. This thesis maps out the shift in the discourses that occurred within the Council, when adopting United Nations Security Council’s resolution (UNSCR) 1325. Moreover, this thesis argues that the nodal point ‘Civilians’ has become gendered by being replaced by the concept of ‘Women’. This thesis argues that UNSC is misrepresenting female agency within the discourses, which has contributed to a gendering of the concept of civilians. Sexual violence, defined as a wa
APA, Harvard, Vancouver, ISO, and other styles
37

Chung, Kang. "Prototyping and evaluation of TCAPsec." Thesis, Karlstad University, Division for Information Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-826.

Full text
Abstract:
<p>Today, the most frequently used signaling system for telecommunication is called Signaling System No. 7 (SS7). The growing usage of mobile telephones and mobile data communica-tion, and the development of new services mean that the risk of intrusion and exploitation of the SS7 signaling networks increases. The increasing problem with unauthorized access to sensitive information and the operators’ growing demand for security is the origin of our work. This thesis presents a prototype design and implementation of a Security Gateway (SEG), which is a fundamental part of the TCAP user security
APA, Harvard, Vancouver, ISO, and other styles
38

Dewar, Robert Scott. "Cyber security in the European Union : an historical institutionalist analysis of a 21st century security concern." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8188/.

Full text
Abstract:
This thesis uses cyber security, an important topic in today's world, as a vector for analysis in order to contribute to a better understanding of the European Union (EU)’s policy-making processes. Although EU policy has received extensive scholarly attention, cyber security policy is under-researched, a gap in current literature this thesis addresses. The goal of the thesis is to understand why the Union adopted and maintained a socio-economic approach to cyber security when other actors added military and defence considerations. The thesis employs an historical institutionalist (HI) framewor
APA, Harvard, Vancouver, ISO, and other styles
39

Ziegler, Thomas. "The long war concept using the security cooperation Marine Air Ground Task Force to address irregular threats through shaping and deterrence /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Gabbert, Silke, and Hans-Peter Weikard. "Food deficits, food security and food aid : concepts and measurement." Universität Potsdam, 1998. http://opus.kobv.de/ubp/volltexte/2006/858/.

Full text
Abstract:
The concepts of food deficit, hunger, undernourishment and food security are discussed. <br>Axioms and indices for the assessment of nutrition of individuals and groups are suggested. <br>Furthermore a measure for food aid donor performance is developed and applied to a sample of bilateral and multilateral donors providing food aid for African countries.
APA, Harvard, Vancouver, ISO, and other styles
41

Dötzer, Florian. "Security concepts for robust and highly mobile ad-hoc networks." kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/627707/627707.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Палагнюк, Д. М., Д. С. Тищук та О. В. Березюк. "Принципи забезпечення інформаційної безпеки". Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/24491.

Full text
Abstract:
In the article the problem of information security as one of the most important in today's information society. The essence of the concept of information security, the basic principles of software.<br>Представлено завдання забезпечення інформаційної безпеки, як одного із головних в сучасному інформаційному суспільстві. Розкрито сутність поняття інформаційної безпеки, основні принципи її забезпечення.
APA, Harvard, Vancouver, ISO, and other styles
43

Tallgren, Eva. "The Concept of'European Citizenship': National Experiences and Post-National Expectations?" Thesis, Linköping University, Department of Management and Economics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2004.

Full text
Abstract:
<p>The aim of this thesis is to interpret and understand the concept of citizenship in general, and the European citizenship in particular, placed within a broad theoretical framework. Furthermore, the purpose is to examine whether the development of a European citizenship indicates an emergence of a new ‘post-national’ model of citizenship, based on residence rather than nationality or place of birth. In order to address this, the status of third- country nationals (TCN’s), who are legally long-term residents within the Union, in relation to EU citizens has been analysed from the theoretical
APA, Harvard, Vancouver, ISO, and other styles
44

Mun, Byeongcheol. "The North Korean nuclear crisis and the Six Party Talks : organising international security : hegemony, concert of powers, and collective security." Thesis, University of Newcastle Upon Tyne, 2010. http://hdl.handle.net/10443/762.

Full text
Abstract:
The end of the Cold war has brought with it the emergence of the new international security environment. State actors can no longer calculate their national interests as they did it before. Thus, it seems sensible to explore the question of how security is being organised in the post-Cold War era. In addition to a significant change in the structure of the international system, a new security concern has emerged. That is, as a result of the termination of two superpowers rivalry between the US and the former USSR, there has been an important change in global nuclear proliferation arena. For ex
APA, Harvard, Vancouver, ISO, and other styles
45

McGovern, Mark, Jeffrey D. Mayor, and Joseph Symmes. "An operational utility assessment [electronic resource]: measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)." Monterey California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/10312.

Full text
Abstract:
MBA Professional Report<br>Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of t
APA, Harvard, Vancouver, ISO, and other styles
46

McGovern, Mark Symmes Joseph Mayor Jeffrey. "An operational utility assessment [electronic resource] : measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS) /." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/MBAPR/2008/Dec/08Dec%5FMcGovern%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2008."<br>Advisor(s): Nussbaum, Daniel ; Franck, Raymond. "December 2008." "MBA professional report"--Cover. Description based on title screen as viewed on January 28, 2009. Includes bibliographical references (p. 81-86). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
47

Lefeez, Sophie. "An examination of the validity of the concept of nuclear deterrence within the framework of post-cold war international relations : an analytical conflict resolution approach." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/827.

Full text
Abstract:
Nuclear deterrence is born from the two superpowers’ relations during the Cold War as they were the first countries to get nuclear weapons and they were the main and most powerful rivals in the world. Then new actors joined the game by testing their own nuclear bombs: the UK in 1952, followed by France in 1960, China in 1964, India in 1974, and Pakistan in 1998. Israel pretends it does not have any nuclear weapons but it is an open secret that they do 1. France helped Israel to get its weapons and the nuclear explosion in 1979 off the southern coast of Africa probably involved Israel and South
APA, Harvard, Vancouver, ISO, and other styles
48

Blake, Gatto Sharon Elizabeth. "MAnanA: A Generalized Heuristic Scoring Approach for Concept Map Analysis as Applied to Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2526.

Full text
Abstract:
Concept Maps (CMs) are considered a well-known pedagogy technique in creating curriculum, educating, teaching, and learning. Determining comprehension of concepts result from comparisons of candidate CMs against a master CM, and evaluate "goodness". Past techniques for comparing CMs have revolved around the creation of a subjective rubric. We propose a novel CM scoring scheme called MAnanA based on a Fuzzy Similarity Scaling (FSS) score to vastly remove the subjectivity of the rubrics in the process of grading a CM. We evaluate our framework against a predefined rubric and test it with CM data
APA, Harvard, Vancouver, ISO, and other styles
49

Anderson, Jamie. "The Looming Threat of an Avian Flu Pandemic: Concepts of Human Security." Thesis, Boston College, 2006. http://hdl.handle.net/2345/374.

Full text
Abstract:
Thesis advisor: Paul Gray<br>As birds throughout Asia, Europe, and Africa have been infected with an avian influenza, public health experts everywhere are worried that if spread to humans, the world could face a pandemic with proportions similar to the 1918 Spanish influenza. In the past, the federal government has been more concerned with foreign militaries than foreign diseases. But today, the government has devoted over $7.1 billion to preventing a potential pandemic. While much of this goes to research and the production of vaccinations, money is also allocated to strengthen local infrastr
APA, Harvard, Vancouver, ISO, and other styles
50

Vaughn, Reginald Wayne. "Computer security concepts and issues in the Information Technology Management (370) Curriculum." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23841.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>DoD has become increasingly dependent upon storing its sensitive information in electronic form and has a deep concern for the integrity and privacy of this valuable information. In the recent aftermath of numerous electronic break-ins, the DoD continues to express anxiety over technically weak system administrators' inability to protect sensitive electronic information. The solution to minimizing these electronic intrusions and bolstering computer security in DoD is to educate military officers and federal civilians in the metho
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!