Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Security state.

Thèses sur le sujet « Security state »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Security state ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Texte intégral
Résumé :
<p>Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security. </p><p>This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chap
Styles APA, Harvard, Vancouver, ISO, etc.
2

Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Texte intégral
Résumé :
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Texte intégral
Résumé :
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state dis
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Texte intégral
Résumé :
CHDS State/Local<br>Approved for public release, distribution is unlimited<br>To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Fed
Styles APA, Harvard, Vancouver, ISO, etc.
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Texte intégral
Résumé :
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusion
Styles APA, Harvard, Vancouver, ISO, etc.
9

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Texte intégral
Résumé :
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Texte intégral
Résumé :
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations:
Styles APA, Harvard, Vancouver, ISO, etc.
11

Fugère, Charles. "Muslims, national security and the state in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98922.

Texte intégral
Résumé :
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, I examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. I argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations:
Styles APA, Harvard, Vancouver, ISO, etc.
12

Adelwerth, Shawn. "Security of a Small State: Case of Kuwait." Honors in the Major Thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/694.

Texte intégral
Résumé :
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf<br>Bachelors<br>Arts and Sciences<br>Political Science
Styles APA, Harvard, Vancouver, ISO, etc.
13

Kirisci, Mustafa. "State Capacity, Security Forces and Terrorist Group Termination." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609106/.

Texte intégral
Résumé :
This dissertation examines how different forms of state capacity affect the decision of terror groups to end their campaign. Building a theoretical framework about the relationship between state capacity and terrorist group termination, I address the following research questions: How do terror groups respond to the changes in non-repressive forms of state's capacity, such as bureaucratic capacity, extractive capacity, and how do those responses of terror groups affect the chance of their demise? How do the changes in non-repressive forms of state capacity affect the likelihood of termination o
Styles APA, Harvard, Vancouver, ISO, etc.
14

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Agrawal, Richa. "FSM State Assignment for Security and Power Optimization." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535635496357999.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Davis, Joe Benton Seroka Jim. "An examination of state level homeland security organizations." Auburn, Ala, 2008. http://hdl.handle.net/10415/1496.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Giannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.

Texte intégral
Résumé :
During the last century, technological advances have deeply renewed many critical infrastructures, such as transportation networks and power systems. In fact, the strong interconnection between physical process, communication channels, and control systems have led to the new concept of cyber-physical systems. Next to countless new advantages, these systems unfortunately have also new weaknesses. An example is cyber-attacks: malicious intrusions into the communication channel turned to manipulate data. In this thesis the considered cyber-physical system is a power network where hundreds of eld
Styles APA, Harvard, Vancouver, ISO, etc.
18

Hong, Yong-Pyo. "State security and regime security : the security policy of South Korea under the Syngman Rhee government 1953-1960." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308856.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Snetkov, Aglaya. "The evolution of Russia's security discourse 2000-2008 : state identity, security priorities and Chechnya." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/2887/.

Texte intégral
Résumé :
This thesis examines the evolution of Russia’s internal and external security perceptions from 2000-2008. Drawing on social constructivist ontology, it argues that the Putin regime’s articulation of security priorities evolved in relation to its reconceptualisation of Russian state identity from a ‘weak’ to a ‘strong’ state. To trace this evolutionary relationship between state identity and security perceptions, official discourse on Chechnya is examined. In this way, Russian narrative constructions of the process of securitisation and desecuritisation of Chechnya, and the role that this disco
Styles APA, Harvard, Vancouver, ISO, etc.
20

Ralston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.

Texte intégral
Résumé :
The driving argument of this thesis is that states, particularly the United States, are vulnerable in cyberspace for reasons that go beyond the material vulnerabilities that present studies on state insecurity in cyberspace focus on. This vulnerability in cyberspace is an ontological insecurity. Ontological insecurity reveals itself in the contradictions in official state discourse regarding cyberspace. State security of self—preserving and maintaining the seemingly concrete and consistent nature of what a state is about, how the state is understood in relation to other states, and how the
Styles APA, Harvard, Vancouver, ISO, etc.
21

Rosell, Richard G. "What type of state homeland security strategy should the state of New Jersey develop?" Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FRosell.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2007.<br>Thesis Advisor(s): Bellavita, Christopher. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p. 53-56). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Afful, Ebuley. "Violence and State Security in Africa: A Sociological Analysis." Bulletin of Ecumenical Theology, 1995. http://digital.library.duq.edu/u?/bet,1987.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Jastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.

Texte intégral
Résumé :
Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information security management in this thesis, and new information security management solutions are searched in the in
Styles APA, Harvard, Vancouver, ISO, etc.
24

Longwill, Edward. "The Irish Army and state security policy, 1956-74." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.554245.

Texte intégral
Résumé :
Security policy is an essential component of any state's governance. It consists of addressing present and predicted future threats to the state's external, border or internal security. In the past security policy analysts merely examined subjects with a myopic militarist or threat based analysis. However in recent years the field became more sophisticated and researchers must assess policy in relation to broader, interconnected considerations such as the state's economic capacity to support the military, domestic idiosyncrasies which may generate public opinion and influence the political eli
Styles APA, Harvard, Vancouver, ISO, etc.
25

Black, Christina Leanne. "State-building in Afghanistan : a gendered human security perspective." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45042.

Texte intégral
Résumé :
With the transition to Afghan national control underway in Afghanistan, questions of legitimacy and security continue to surround the last decade of international military involvement in the country. The initial bombing campaign and subsequent military operations following the terrorist attacks of 9/11 proclaimed the goal of providing humanitarian relief to Afghans as one of the primary motives behind military action. In order to achieve the stated objectives in Afghanistan, the cooperating states implemented a 'comprehensive approach' to state-building, whereby the military intervention was c
Styles APA, Harvard, Vancouver, ISO, etc.
26

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

MacCulloch, Robert. "The structure of the welfare state." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339057.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Hwang, In Soo. "The United States-Republic of Korea security relationship, 1953-1960 : great power and small state." Thesis, University College London (University of London), 1999. http://discovery.ucl.ac.uk/1318002/.

Texte intégral
Résumé :
This study investigates South Korea's security behaviour vis-a-vis the United States and that of the U.S. towards Korea. The significance of this study lies in its emphasis upon relations between South Korea and the United States during the 1953- 1960 period from the perspective of the patron-client state relationship. This study analyses the issues and historical events in order to trace the development of each nation's strategy, leverages, and tactics towards the other. Each chapter is related to the U.S. security commitment policy to South Korea, and South Korea's response in the frame work
Styles APA, Harvard, Vancouver, ISO, etc.
29

Nash, Kathryn. "From state security to human security : the evolution of norms at the regional level in Africa." Thesis, SOAS, University of London, 2018. http://eprints.soas.ac.uk/26493/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Moeller, David K. "A model for future military operations : the effect of state security and human security on strategy /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=9c267789-85b9-4963-9298-936e82991d13&rs=PublishedSearch.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Thomas, Mark D. "Deployment of state traffic law enforcement officers for Homeland Security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FThomas.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): David Brannan. "March 2006." Includes bibliographical references (p. 55-58). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Silver, Jade. "Food Security on Maui: Reinventing Agriculture in the Aloha State." Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/scripps_theses/143.

Texte intégral
Résumé :
This thesis focuses on the past, present, and future of food sustainability on Maui. It begins by explaining ancient Hawaiian agriculture and how this complex system of agriculture was deeply rooted in the customs and traditions of the Hawaiian people. The second section explores how this sustainable agricultural system changed after the arrival of Captain Cook in 1778. After western settlement, land that was once a communal resource became privatized. As land ownership shifted, the traditional subsistence agricultural system of Hawai’i began to change. Export crops such as sugar cane and pine
Styles APA, Harvard, Vancouver, ISO, etc.
33

Pohnel, Jonathan R. "State Defense Forces and their role in American homeland security." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45242.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited<br>State Defense Forces (SDFs), or organized state militias and naval militias, have a long and distinguished history of service in the United States. These state-sanctioned organizations are substantiated and legitimized through the U.S. justice system and constitutional law. Currently, 23 states and U.S. territories have SDFs; unlike National Guard units, they cannot be federalized, which means they remain a state-level asset during emergency management operations. SDFs were utilized successfully during Hurricane Katrina, proving their v
Styles APA, Harvard, Vancouver, ISO, etc.
34

Criswell, Deanne B. "Homeland Security : Developing National Doctrine to Guide State Strategy Development." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6783.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited<br>If one subscribes to the belief that doctrine is a common understanding of what fundamental principles guide an organization, then this thesis demonstrates that there is currently no common understanding of homeland security. There is currently a lack of institutional doctrine that can be applied nationally for state level government to develop their homeland security strategies. The military has a long history of successfully using doctrine to develop war-fighting strategy. Comparisons can be made to the Air Forces use of doctrine to g
Styles APA, Harvard, Vancouver, ISO, etc.
35

Grogan, Michael S. "National security imperatives and the neorealist state: Iran and realpolitik." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7744.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited<br>This thesis argues that pragmatic, neorealist interests-reducing Iran's international isolation, opening avenues for economic cooperation and commercial exchange, restoring religious and cultural links, and safeguarding the mutually advantageous relationships with influential powers in the region- are the true foundations of Iranian national security and foreign policy decisionmaking. Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for
Styles APA, Harvard, Vancouver, ISO, etc.
36

Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.

Texte intégral
Résumé :
This thesis is concerned with examining the intersection between the failed state and security governance literatures, through the case study of Jamaica. This thesis is primarily concerned with examining the under-researched link between concerns raised in failed state and security governance literatures. The thesis proposes that the presence of state failure and success in the same setting is a direct result of the execution of a problematic security governance framework that impedes the nation’s ability to establish a stable state infrastructure that is capable of fulfilling the welfare need
Styles APA, Harvard, Vancouver, ISO, etc.
37

Nuqui, Reynaldo Francisco. "State Estimation and Voltage Security Monitoring Using Synchronized Phasor Measurements." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/28266.

Texte intégral
Résumé :
The phasor measurement unit (PMU) is considered to be one of the most important measuring devices in the future of power systems. The distinction comes from its unique ability to provide synchronized phasor measurements of voltages and currents from widely dispersed locations in an electric power grid. The commercialization of the global positioning satellite (GPS) with accuracy of timing pulses in the order of 1 microsecond made possible the commercial production of phasor measurement units. Simulations and field experiences suggest that PMUs can revolutionize the way power systems are moni
Styles APA, Harvard, Vancouver, ISO, etc.
38

Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.

Texte intégral
Résumé :
During the latest events in the aviation world, where experts in the field of cybersecurity (example) opened the possibility of gaining access to the aircraft's on-board systems, industry experts (and not only) thought about it. And we are doing quite a lot. There are many existing guides that contain recommendations and practices, for example: «Software Considerations in Airborne Systems and Equipment Certification» contains recommendations for evaluating security and assuring software quality. There is a separation of access, because all systems are somehow connected to each other th
Styles APA, Harvard, Vancouver, ISO, etc.
39

Kliushnyk, T., A. Drofa, Тетяна Володимирівна Щербина, Татьяна Владимировна Щербина, and Tetiana Volodymyrivna Shcherbyna. "The state financial security and sustainability of financial sector in Ukraine: their state and management peculiarities." Thesis, Sumy State University, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77597.

Texte intégral
Résumé :
Constant increasing of financial system’s role and importance is becoming a salient characteristic of the modern development of the domestic economy. It provides uninterrupted process of national product formation and promotes economic growth in the country. Given the undeniable importance of finance in the processes of the state's economy functioning, the issues of financial security ensuring and effective financial security management become especially relevant.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Ashe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.

Texte intégral
Résumé :
Thesis (M.S.)--East Tennessee State University, 2004.<br>Title from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Shropshire, Jordan Douglas. "Predicting compliance with prescribed organizational information security protocols." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-10202008-120221.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

MacDonald, Robert L. "Rogue State? The United States, Unilateralism, and the United Nations." See Full Text at OhioLINK ETD Center (Requires Adobe Acrobat Reader for viewing), 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1154015815.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Chen, Darren. "State and urban area homeland security strategy v3.0 evolving strategic planning /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FChen.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Robert Bach. "March 2006." Includes bibliographical references (p. 45-46). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Collins, Andrew Elliott Egerton. "Saving State-Building: EU Contributions to Security Sector Reform in Afghanistan." Thesis, University of Canterbury. National Centre for Research on Europe, 2011. http://hdl.handle.net/10092/6311.

Texte intégral
Résumé :
State failure represents one of the most pressing concerns for international security in the 21st century, and Afghanistan represents one of the most concerted efforts ever witnessed to address this phenomenon in a lasting and sustainable way. This thesis takes the position that part of the difficulty in finding a remedy for state failure relates to the contradictions and dilemmas inherent within the state-building enterprise itself. The trade-offs required by certain fundamental aspects of state-building must be better understood if they are to be effectively managed, and these trade-offs can
Styles APA, Harvard, Vancouver, ISO, etc.
46

Hoffman, Samantha R. "Programming China : the Communist Party's autonomic approach to managing state security." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/48547/.

Texte intégral
Résumé :
Programming China: The Communist Party’s Autonomic Approach to Managing State Security, introduces the new analytical framework called China's “Autonomic Nervous System” (ANS). The ANS framework applies complex systems management theory to explain the process the Chinese Communist Party calls “social management”. Through the social management process, the Party-state leadership interacts with both the Party masses and non-Party masses. The process involves shaping, managing and responding and is aimed at ensuring the People’s Republic of China’s systemic stability and legitimacy—i.e. (Party-)
Styles APA, Harvard, Vancouver, ISO, etc.
47

Busato, Marco <1995&gt. "The State of Strict Transport Security: Current Deployment and Correct Configuration." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19274.

Texte intégral
Résumé :
Nowadays, the topic of security has become a popular issue due to the contemporary digital society in constant development. Thus, HTTPS only is not enough in order to ensure a high security level (e.g. feeling protected while surfing the net). Therefore, a new mechanism has increased its employment: the Strict Transport Security, which enhances the security between a user agent and a server. In this thesis, it will be defined the best application of this system by observing the common settings over the internet and the reason why it is preferable declaring some directives and carry out its cur
Styles APA, Harvard, Vancouver, ISO, etc.
48

Scott, Katherine Anne. "Reining in the State: Civil Society, Congress, and the Movement to Democratize the National Security State, 1970-1978." Diss., Temple University Libraries, 2009. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/38730.

Texte intégral
Résumé :
History<br>Ph.D.<br>This dissertation explores the battle to democratize the national security state, 1970-1978. It examines the neo-progressive movement to institutionalize a new domestic policy regime, in an attempt to force government transparency, protect individual privacy from state intrusion, and create new judicial and legislative checks on domestic security operations. It proceeds chronologically, first outlining the state's overwhelming response to the domestic unrest of the 1960s. During this period, the Department of Justice developed new capacities to better predict urban unrest,
Styles APA, Harvard, Vancouver, ISO, etc.
49

Scollan, Thomas J. "An assessment of the New York State Enhanced Security Guard Training legislation and its efficacy on security officer preparedness." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10688.

Texte intégral
Résumé :
CHDS State/Local<br>This thesis analyzes the results of a survey instrument administered to a random sample of New York City security officers in order to understand the relationship between job training and turnover and, in turn, the effect of high turnover on the preparedness and effectiveness of that population in performing its duties. Replicating a 2004 survey sponsored by the New York City Public Advocate Office, which exposed poor training and rampant turnover among security guards and resulted in the August 2005 New York State Enhanced Security Guard Training legislation, this thesi
Styles APA, Harvard, Vancouver, ISO, etc.
50

Adhikari, Upendra. "BAMBOO FLOWERING, HUMAN SECURITY AND THE STATE: A POLITICAL ECOLOGICAL STUDY OF THE IMPACT OF CYCLICAL BAMBOO FLOWERING ON HUMAN SECURITY AND THE ROLE OF STATE IN MIZORAM." Thesis, University of North Bengal, 2013. http://hdl.handle.net/123456789/1487.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!