Siga este link para ver outros tipos de publicações sobre o tema: The Concept of Security.

Teses / dissertações sobre o tema "The Concept of Security"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "The Concept of Security".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Dolan, Mark E. "The seamless maritime concept." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDolan.pdf.

Texto completo da fonte
Resumo:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2005.<br>Thesis Advisor(s): S. Starr King. Includes bibliographical references (p. 67-69). Also available online.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Neville, Karen M. "IS security leveraging the concept of knowledge management." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.

Texto completo da fonte
Resumo:
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS rese
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Schmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.

Texto completo da fonte
Resumo:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Tigerstrom, Barbara J. von. "The concept of human security : some implications for international law." Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423873.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

May, Elizabeth. "Attachment security, self-concept clarity and beliefs in obsessive-compulsive disorder." Thesis, University of Hertfordshire, 2007. http://hdl.handle.net/2299/853.

Texto completo da fonte
Resumo:
Cognitive models of obsessive-compulsive disorder (OCD) suggest that an ambivalent self-concept and dysfunctional beliefs play an important role in the pathogenesis of OCD. Early attachment experience is argued to be the main process through which such ambivalent self-representations develop. The current study investigated self-concept clarity, a broader construct than ambivalence, attachment security, obsessive-compulsive (OC)-relevant beliefs and their relation to OC symptoms. Forty four people who reported experiencing OC symptoms were compared to 34 individuals who reported no mental healt
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Lack, Lindsey A. "Using the bootstrap concept to build an adaptable and compact subversion artifice." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FLack.pdf.

Texto completo da fonte
Resumo:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 69-71). Also available online.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Morrissey, Joseph Patrick. "The extension and hardware implementation of the comprehensive integrated security system concept." Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.

Texto completo da fonte
Resumo:
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditi
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Schmalen, Daniel. "Security Concept for VPN IPsec Site-to-Site Connections to Third Parties." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.

Texto completo da fonte
Resumo:
<p> VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation. </p><p> This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key find
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Zacarias, Agostinho M. "The security concept in Southern Africa : prospects for the post-apartheid era." Thesis, London School of Economics and Political Science (University of London), 1996. http://etheses.lse.ac.uk/1426/.

Texto completo da fonte
Resumo:
The thesis examines the concept of security that states and other actors in Southern Africa have acted upon. It argues that Southern Africa, due to its peculiar colonial history and apartheid, and the regions' links with great powers, embraced the traditional concept of security, a concept that was unsustainable and inappropriate for its specific conditions. The traditional concept seeks to protect states and domestic societies from outside threats. This concept was inherently militaristic, nationally focused, state-centric and narrow in scope. The emphasis is on immediate problem-solving rath
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Ransome, Paul Edward. "An analysis of recent changes in the concept and practice of work." Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307014.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Larsson, Sebastian. "Guarding the gates : Reassessing the concept of borders in Tanzania." Thesis, Södertörns högskola, Institutionen för livsvetenskaper, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-17178.

Texto completo da fonte
Resumo:
Using discourse analysis, this study will apply a critical theoretical framework and discuss how perceptions of the Tanzanian national borders compares to problematized understandings of the socially constructed concepts of borders, sovereignty, and power. For example, the Tanzanian borders will be reassessed into something creating a safe ‘inside’ opposing an unsafe ‘outside, and into something dividing territories, thus, giving birth to the identities of ‘nationality’. Furthermore, the presence of biopolitical interventions will be discussed in order to see how biopower can help increase sec
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Holford, John William. "The concept of self-defending objects and the development of security aware applications." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16227/1/John_Holford_Thesis.pdf.

Texto completo da fonte
Resumo:
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm, whereby those objects that encapsulate the protected resources of a security aware application (SAA), are made aware of, and responsible for, the defence of those resources. That defence takes two forms, the enforcement of mandatory access control on protected resources and the generation of the corresponding portion of the SAA's audit trail. The SDO concept acts as the philosophy that guides the application level mandatory access control within SAAs which ensures that the provided access contr
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Holford, John William. "The concept of self-defending objects and the development of security aware applications." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.

Texto completo da fonte
Resumo:
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm, whereby those objects that encapsulate the protected resources of a security aware application (SAA), are made aware of, and responsible for, the defence of those resources. That defence takes two forms, the enforcement of mandatory access control on protected resources and the generation of the corresponding portion of the SAA's audit trail. The SDO concept acts as the philosophy that guides the application level mandatory access control within SAAs which ensures that the provided access contr
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Busmire, Terence Edward. "Concept definitions and security requirements of a cooperative execution environment for distributed computing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275515.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Johnson, Olga. "The concept of energy security : implications of EU-Russia energy relations, 2004-2012." Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/14357/.

Texto completo da fonte
Resumo:
This research project presents a novel and fundamental understanding of energy security and threat perceptions by analysing the EU-Russia energy relationship concerning gas supply during the period 2004-2012. The ultimate goal of this thesis is to address the two-fold research question of why differences exist in the threat perceptions and understandings of energy security among member states of the EU, and how they affect EU’s energy stance and its gas relations with Russia. Encountering endemic problems with the coherence of EU energy policy towards Russia, the research focuses on two case s
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Hockmann, Volker. "Developing a concept for handling IT security with secured and trusted electronic connections." Thesis, University of Wolverhampton, 2014. http://hdl.handle.net/2436/324189.

Texto completo da fonte
Resumo:
In this day and age, the Internet provides the biggest linkage of information, personal data and information, social contact facilities, entertainment and electronic repository for all things including software downloads and tools, online books and technical descriptions, music and movies - both legal and illegal [Clarke, 1994]. With the increasing bandwidth in the last few years worldwide, it is possible to access the so-called "Triple-Play-Solutions" - Voice over lP, High-Speed-Internet and Video on Demand. More than 100 million subscribers have signed on across Asia, Europe, and the America
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Andreasson, Emelie. "All in the name of security : A qualitative content analysis regarding the concept of security in the movie Zero Dark Thirty." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7100.

Texto completo da fonte
Resumo:
This study explores how the concept of security is presented in current American action movies.This study will use the movie Zero Dark Thirty as an illustrative example to examine the concept ofsecurity during the ’War on Terror’-era. The study will use qualitative content analysis in order toexamine the concept of security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Cobb, Adam Campbell. "Changes in the concept of security since World War II among Western international theorists." Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/252234.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Siko, Isaac Mohlolo. "A critical review of South Africa's approach to the concept of national security since 1994." Diss., Pretoria : [s. n.], 2007. http://upetd.up.ac.za/thesis/available/etd-01242008-121403/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Austin, William H. "The United States Department of Homeland Security concept of regionalization - Will it survive the test?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FAustin.pdf.

Texto completo da fonte
Resumo:
Thesis (M.S. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Robert Bach. "September 2006." Includes bibliographical references (p. 75-80). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Covic, Mirjana, and Thomas Kohler. "IT security for small and medium-sized enterprises : A didactical concept of a dynamical questionnaire." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6266.

Texto completo da fonte
Resumo:
<p>This master thesis has been written at the School of Mathematics and System Engineering (MSI) at Växjö University in the field of computer science. IT security has become one of the main topics of every enterprise since they all use information technology in their business. Investments have to be done in order to achieve a high protection status of the IT environments. Specially small and medium-sized enterprises need more knowledge and advisory how to handle their IT security. This thesis analyses management tools that have the goal to improve the IT security. The second and main part of t
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Bude, Cristian, and Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Texto completo da fonte
Resumo:
Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later aspect leads to major security challenges. Today, IoT is in great need of standardization and clear architectures that descr
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Shipman-Sercu, Chris. "A False Sense of Security: The Social Security Debate." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/65.

Texto completo da fonte
Resumo:
My motivation to write this thesis is based on the controversy surrounding the Social Security system that has recently infiltrated the media. Through my research, I have discovered the debate concerning Social Security is not a recent development but has existed since the 1930’s. Many sources are warning citizens to no longer count on Social Security as they most likely will not receive benefits until a extremely old age if they receive benefits at all. Current retirees are fearful of either a decrease in benefits or not receiving the money they contributed to the system through the years of
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Le, Bras Jean-Baptiste. "The impact of the SSR (security sector reform) concept in shaping NATO and EU policy discourses." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/06607949001/$FILE/06607949001.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Hürsoy, Siret. "The new security concept and German-French approaches to the European "Pillar of Defence", 1990-2000 /." Marburg : Tectum, 2002. http://catalogue.bnf.fr/ark:/12148/cb41448411t.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Holm, Linnea. "Nord Stream - Vägen till säkerhet?" Thesis, Linnaeus University, LNU, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5745.

Texto completo da fonte
Resumo:
<p>Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.</p><p>The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy s
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Pries, Kari Mariska. "Contested concepts and practices in security governance : evolving security approaches in El Salvador." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8070/.

Texto completo da fonte
Resumo:
Hope accompanied El Salvador’s peace agreements, ending 12 years of civil war. New peace and democratic renewal were expected in the tiny Central American state. Instead, extreme violence has persisted as a lived experience for individuals and a part of its state operations. Successive governments proved unable to consolidate control over the post-war crime wave. ‘Tough on crime’ public policy agendas, which included hard-handed violence-repression tactics, had little success in mitigating insecurity. In 2009, a new ex-guerrilla party, the National Liberation Front ‘Farabundo Marti’ (FMLN), wa
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Pretorius, William Richard. "The impact of the concept of decent work on the job security and the provisioning of educators." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021218.

Texto completo da fonte
Resumo:
Section 29(1) of the Constitution of the Republic of South Africa (the Constitution) guarantees the right to a basic education, including a basic adult education and further education. In realising this right, the State is obliged to provide financial and human resources in a manner that will transform society as a whole and deliver a better life for all citizens. The human resources in the main refer to educators. Education is one of key priorities of the present government to the extent that President Zuma has instructed that a presidential commission be established to look into the conditio
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Uzelman, Alexandra. "The transformation of the concept of the Westphalian sovereignty within the EU Common Foreign and Security Policy." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-164218.

Texto completo da fonte
Resumo:
The work overviews the formation process of the European integration after the end of the Cold war and also the evolution of the notion of 'the Westphalian sovereignty' in the framework of the maintenance of the EU CFSP. It is assumed that under the conditions of a political transformation of the category 'the Westphalian sovereignty' in the framework of the EU CFSP it is intensified and requires again as a special political and practical attention, as scientific elaboration in order to figure out the perspectives of the development of the EU as the whole. As the object of this work the catego
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Unkenholz, Willard L. "Command and control security: concepts and practices." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25741.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Khodadadzadeh, Omid. "Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36305.

Texto completo da fonte
Resumo:
This essay conducts a descriptive analysis of the ideas expressed by NATO´s official security strategy "Strategic Concept" from 2010 and the European Union’s security strategy "A Secure Europe in a Better World" from 2003. The purpose of this analysis is to examine whether the ESDP and NATO are compatible with each other when it comes to the role of security policy actor. To do so, I´ve chosen to analyse the actors' security strategies based on three dimensions. These dimensions are: Their view of the international scene, their views on cooperation and their views on how to reach security. As
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

EULANO, ANTHONY CONNOR. "DYSPROSIUM: A UNITED STATES SECURITY CONCERN." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/612885.

Texto completo da fonte
Resumo:
This paper seeks to explore how United States dependency on foreign supplies of dysprosium affects its ability to produce and maintain current and future military defense systems. Dysprosium, one of the 17 rare earth metals, is necessary for the production of powerful permanent magnets. These magnets are used in high-tech weapon systems, such as Unmanned Aerial Vehicles. The problem is that the U.S. remains completely dependent on China for its dysprosium supply. This paper does not seek to answer the possibility or likelihood of China blocking the supply of dysprosium to the U.S. Instead, it
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Delo, Sarah. "The effects of the teacher-child relationship and caregiver attachment security on children's self-concept in middle childhood." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/401545/.

Texto completo da fonte
Resumo:
A positive self-concept is associated with a number of outcomes including school adjustment, academic attainment and mental health. Literature suggests individual differences in self-concept derive from children’s relationships with significant others such as parents and teachers. A systematic review of the literature exploring the relationship between teacher-child relationships and children’s self-concept found some associations, however, this was not always consistently found. Furthermore, a number of methodological limitations in the studies were noted. Implications for future research wer
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Meyer, Patrik Kristof. "Governing Muslim minorities as security treats : the case of the Uyghurs and the concept of a new Chinese nation." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610840.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Deshpande, Pranita. "Assessment Of Two Pedagogical Tools For Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.

Texto completo da fonte
Resumo:
Cybersecurity is an important strategic areas of computer science, and a difficult discipline to teach effectively. To enhance and provide effective teaching and meaningful learning, we develop and assess two pedagogical tools: Peer instruction, and Concept Maps. Peer instruction teaching methodology has shown promising results in core computer science courses by reducing failure rates and improving student retention in computer science major. Concept maps are well-known technique for improving student-learning experience in class. This thesis document presents the results of implementing and
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Hamark, Kindborg Johanna. "The patriarchy dressed in feminist clothes : A discourse analysis of the United Nations Security Council’s gendering of the concept Civilians." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6150.

Texto completo da fonte
Resumo:
This thesis analyses key documents from the United Nations Security Council (the Council) meetings during the period of 1999 to 2001. This thesis maps out the shift in the discourses that occurred within the Council, when adopting United Nations Security Council’s resolution (UNSCR) 1325. Moreover, this thesis argues that the nodal point ‘Civilians’ has become gendered by being replaced by the concept of ‘Women’. This thesis argues that UNSC is misrepresenting female agency within the discourses, which has contributed to a gendering of the concept of civilians. Sexual violence, defined as a wa
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Chung, Kang. "Prototyping and evaluation of TCAPsec." Thesis, Karlstad University, Division for Information Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-826.

Texto completo da fonte
Resumo:
<p>Today, the most frequently used signaling system for telecommunication is called Signaling System No. 7 (SS7). The growing usage of mobile telephones and mobile data communica-tion, and the development of new services mean that the risk of intrusion and exploitation of the SS7 signaling networks increases. The increasing problem with unauthorized access to sensitive information and the operators’ growing demand for security is the origin of our work. This thesis presents a prototype design and implementation of a Security Gateway (SEG), which is a fundamental part of the TCAP user security
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Dewar, Robert Scott. "Cyber security in the European Union : an historical institutionalist analysis of a 21st century security concern." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8188/.

Texto completo da fonte
Resumo:
This thesis uses cyber security, an important topic in today's world, as a vector for analysis in order to contribute to a better understanding of the European Union (EU)’s policy-making processes. Although EU policy has received extensive scholarly attention, cyber security policy is under-researched, a gap in current literature this thesis addresses. The goal of the thesis is to understand why the Union adopted and maintained a socio-economic approach to cyber security when other actors added military and defence considerations. The thesis employs an historical institutionalist (HI) framewor
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Ziegler, Thomas. "The long war concept using the security cooperation Marine Air Ground Task Force to address irregular threats through shaping and deterrence /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490846.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Gabbert, Silke, and Hans-Peter Weikard. "Food deficits, food security and food aid : concepts and measurement." Universität Potsdam, 1998. http://opus.kobv.de/ubp/volltexte/2006/858/.

Texto completo da fonte
Resumo:
The concepts of food deficit, hunger, undernourishment and food security are discussed. <br>Axioms and indices for the assessment of nutrition of individuals and groups are suggested. <br>Furthermore a measure for food aid donor performance is developed and applied to a sample of bilateral and multilateral donors providing food aid for African countries.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Dötzer, Florian. "Security concepts for robust and highly mobile ad-hoc networks." kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/627707/627707.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Палагнюк, Д. М., Д. С. Тищук та О. В. Березюк. "Принципи забезпечення інформаційної безпеки". Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/24491.

Texto completo da fonte
Resumo:
In the article the problem of information security as one of the most important in today's information society. The essence of the concept of information security, the basic principles of software.<br>Представлено завдання забезпечення інформаційної безпеки, як одного із головних в сучасному інформаційному суспільстві. Розкрито сутність поняття інформаційної безпеки, основні принципи її забезпечення.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Tallgren, Eva. "The Concept of'European Citizenship': National Experiences and Post-National Expectations?" Thesis, Linköping University, Department of Management and Economics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2004.

Texto completo da fonte
Resumo:
<p>The aim of this thesis is to interpret and understand the concept of citizenship in general, and the European citizenship in particular, placed within a broad theoretical framework. Furthermore, the purpose is to examine whether the development of a European citizenship indicates an emergence of a new ‘post-national’ model of citizenship, based on residence rather than nationality or place of birth. In order to address this, the status of third- country nationals (TCN’s), who are legally long-term residents within the Union, in relation to EU citizens has been analysed from the theoretical
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Mun, Byeongcheol. "The North Korean nuclear crisis and the Six Party Talks : organising international security : hegemony, concert of powers, and collective security." Thesis, University of Newcastle Upon Tyne, 2010. http://hdl.handle.net/10443/762.

Texto completo da fonte
Resumo:
The end of the Cold war has brought with it the emergence of the new international security environment. State actors can no longer calculate their national interests as they did it before. Thus, it seems sensible to explore the question of how security is being organised in the post-Cold War era. In addition to a significant change in the structure of the international system, a new security concern has emerged. That is, as a result of the termination of two superpowers rivalry between the US and the former USSR, there has been an important change in global nuclear proliferation arena. For ex
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

McGovern, Mark, Jeffrey D. Mayor, and Joseph Symmes. "An operational utility assessment [electronic resource]: measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)." Monterey California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/10312.

Texto completo da fonte
Resumo:
MBA Professional Report<br>Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of t
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

McGovern, Mark Symmes Joseph Mayor Jeffrey. "An operational utility assessment [electronic resource] : measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS) /." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/MBAPR/2008/Dec/08Dec%5FMcGovern%5FMBA.pdf.

Texto completo da fonte
Resumo:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2008."<br>Advisor(s): Nussbaum, Daniel ; Franck, Raymond. "December 2008." "MBA professional report"--Cover. Description based on title screen as viewed on January 28, 2009. Includes bibliographical references (p. 81-86). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Lefeez, Sophie. "An examination of the validity of the concept of nuclear deterrence within the framework of post-cold war international relations : an analytical conflict resolution approach." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/827.

Texto completo da fonte
Resumo:
Nuclear deterrence is born from the two superpowers’ relations during the Cold War as they were the first countries to get nuclear weapons and they were the main and most powerful rivals in the world. Then new actors joined the game by testing their own nuclear bombs: the UK in 1952, followed by France in 1960, China in 1964, India in 1974, and Pakistan in 1998. Israel pretends it does not have any nuclear weapons but it is an open secret that they do 1. France helped Israel to get its weapons and the nuclear explosion in 1979 off the southern coast of Africa probably involved Israel and South
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Blake, Gatto Sharon Elizabeth. "MAnanA: A Generalized Heuristic Scoring Approach for Concept Map Analysis as Applied to Cybersecurity Education." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2526.

Texto completo da fonte
Resumo:
Concept Maps (CMs) are considered a well-known pedagogy technique in creating curriculum, educating, teaching, and learning. Determining comprehension of concepts result from comparisons of candidate CMs against a master CM, and evaluate "goodness". Past techniques for comparing CMs have revolved around the creation of a subjective rubric. We propose a novel CM scoring scheme called MAnanA based on a Fuzzy Similarity Scaling (FSS) score to vastly remove the subjectivity of the rubrics in the process of grading a CM. We evaluate our framework against a predefined rubric and test it with CM data
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Anderson, Jamie. "The Looming Threat of an Avian Flu Pandemic: Concepts of Human Security." Thesis, Boston College, 2006. http://hdl.handle.net/2345/374.

Texto completo da fonte
Resumo:
Thesis advisor: Paul Gray<br>As birds throughout Asia, Europe, and Africa have been infected with an avian influenza, public health experts everywhere are worried that if spread to humans, the world could face a pandemic with proportions similar to the 1918 Spanish influenza. In the past, the federal government has been more concerned with foreign militaries than foreign diseases. But today, the government has devoted over $7.1 billion to preventing a potential pandemic. While much of this goes to research and the production of vaccinations, money is also allocated to strengthen local infrastr
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Vaughn, Reginald Wayne. "Computer security concepts and issues in the Information Technology Management (370) Curriculum." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23841.

Texto completo da fonte
Resumo:
Approved for public release; distribution is unlimited<br>DoD has become increasingly dependent upon storing its sensitive information in electronic form and has a deep concern for the integrity and privacy of this valuable information. In the recent aftermath of numerous electronic break-ins, the DoD continues to express anxiety over technically weak system administrators' inability to protect sensitive electronic information. The solution to minimizing these electronic intrusions and bolstering computer security in DoD is to educate military officers and federal civilians in the metho
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!