Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by e
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by e
This book examines the political consequences of European security commercialisation through increased reliance on private military and security companies (PMSCs).The role of commercial security in th
Northern interventions into African countries at war are dominated by security concerns, bolstered by claims of shared returns and reinforcing processes of development and security. As global security
While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for
Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations,
This book examines the political consequences of European security commercialisation through increased reliance on private military and security companies (PMSCs).The role of commercial security in th
Muhibat (Centre for Strategic and International Studies, Jakarta) examines how states approach security cooperation, emphasizing cooperative security as an approach to regional security. Using primari
The twelfth volume in the series India’s National Security: Annual Review offers a detailed analysis of India’s complex security environment: persistence of major threats, alongside a constructive eng
This book engages the intense relationship between citizenship and security in modern politics. It focuses on questions of citizenship in security analysis in order to critically evaluate how politica
This book engages the intense relationship between citizenship and security in modern politics. It focuses on questions of citizenship in security analysis in order to critically evaluate how politica
In this timely contribution to ensuring the security of global ports, a longtime security and risk manager based in the Middle East provides an overview and analysis of the factors that specifically a
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, se
This book explores current thinking about positive security and seeks to suggest a reformulated positive security concept, and to evaluate the efficacy of such a concept in terms of foreign and securi
Updated annually, the Information Security Management Handbook is the most comprehensive and up-to-date reference available on information security and risk management. Bringing together the knowledge
This timely volume presents the key concepts, issues, and debates surrounding environmental security, illustrating through a range of examples and cases how global environmental matters and internatio
Practical Aviation Security, 2e is a complete guide to the aviation security system, from crucial historical events, to the policies and policy makers and the major terrorist and criminal acts that ha
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledg
The impact of public law depends on how politicians secure control of public organizations, and how these organizations in turn are used to define national security. Governing Security explores this d
The impact of public law depends on how politicians secure control of public organizations, and how these organizations in turn are used to define national security. Governing Security explores this d
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Infor
The Complete Home Security Guide provides an essential reference guide to domestic security and crime prevention. It sets out a clearly defined stratgey to improve home security. It includes informati
The unequal division of power, income, social, and cultural capital is reflected in the field of security. This results in an unequal distribution of security in our society. In this book, the researc
This fully revised new edition develops a comprehensive framework for understanding the key security issues facing Europe. The book addresses key developments in the global and European security envir
This fully revised new edition develops a comprehensive framework for understanding the key security issues facing Europe. The book addresses key developments in the global and European security envir
This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field. New or critical security studi
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every
The work aims at answering the question as to how far discourses on human security are present in Jordan and Israel, if they converge and if political solutions for the issue of water security could b
Maritime Security and the Law of the Sea examines the rights and duties of states across a broad spectrum of maritime security threats. It provides comprehensive coverage of the different dimensions o
A concise, updated guide to LTE Security This is a welcome Second Edition of the successful book on LTE Security (2010) addressing the security architecture for LTE as specified by 3GPP. Since 2010,
Freilich (a fellow at the Harvard Kennedy School and a former deputy national security advisor to the State of Israel) analyzes national security decision making in Israel over the past 30 years. Avow