This study examines ASEAN's role in the establishment of regional security. Angela Pennisi di Floristella posits a more nuanced and flexible concept of regional security partnership to capture the fea
The essays in The Baltic Security Puzzle, contributed by respected international experts, assess the components of this Baltic security puzzle. They place the security and political interests of the t
When first mentioned in 1994, the concept of human security represented a significant first step in understanding that security dilemmas could no longer be seen as purely geopolitical phenomena that r
When first mentioned in 1994, the concept of human security represented a significant first step in understanding that security dilemmas could no longer be seen as purely geopolitical phenomena that r
This book presents a collection of essays on key topics and new perspectives on the EU’s Area of Freedom, Security and Justice (AFSJ).Europe’s area of freedom, security and justice is of increasing im
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of
In Maritime Security Cooperation in the Guinea: Prospects and Challenges, Kamal-Deen Ali provides ground-breaking analyses of the maritime security situation in the Gulf of Guinea.
Security Detention in International Territorial Administrations examines several intricate and overlapping legal questions stemming from security detention practices in a post-conflict environment.
Focusing on the South African city of Durban, Security in the Bubble looks at spatialized security practices, engaging with strategies and dilemmas of urban security governance in cities around the wo
Focusing on the South African city of Durban, Security in the Bubble looks at spatialized security practices, engaging with strategies and dilemmas of urban security governance in cities around the wo
'Invisible social security' is a term coined by Jos Berghman in his early work to draw attention to those aspects of social security that easily tend to be neglected in an instrumental perspective tha
This study presents intriguing analysis of the impact of private security companies' practices upon the fields of security and politics in the Czech Republic. It situates cases concerning ABL, the big
This fourteenth volume of India’s National Security Annual Review intensively analyses India’s national security with respect to the changing internal and external dynamics.In the global environment,
There is a definite need/desire for intelligence-based security throughout the private security industry. An effective in-house intelligence function can help companies identify, evaluate, and mitigat
After the attacks of 9/11 terrorism and other forms of transnational risks of violence dominated official security policy. Researchers at the Institute for Peace Research and Security Policy at the Un
Support for security and justice institutions has become a crucial instrument of international engagement in fragile and conflict-affected states. In attempts to shore up security as a precondition fo
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, se
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has
Safety and Security in Transit Environments presents important interdisciplinary approaches to safety and security on public transport from leading international authors. The book develops a conceptua
Security Culture starts from the premise that, even with good technical tools and security processes, an organisation is still vulnerable without a strong culture and a resilient set of behaviours in
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security analysts and consultants use to identify
Security of Attachment and the Social Development of Cognition investigates how children's security of attachment in infancy is related to various aspects of their cognitive development over the presc
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed fro
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective.The book covers such topics as cloud stora
The adoption of Security Council resolution 1325 on women, peace and security in October 2000 marked the beginning of a global agenda on women in armed conflicts and post-conflict transition. Women, P
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the
Acknowledging the importance of non traditional security in the wider debate, this book looks at one significant aspect namely, environmental security. The book discusses different issues of theoretic
This volume presents systematic empirical research on the implementation of UN Security Council Resolution 1325 on Women, Peace and Security (UNSCR 1325), increasing our understanding of the three the
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystemcomprehensively discusses a range of cloud security topics from multi-disciplinary and international p
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address assoc