In recent years, scholars in international relations and other fields have begun to conceive of security more broadly, moving away from a state-centered concept of national security toward the idea o
Global Development and Human Security explores the possibility of connecting all countries to the global economy while defusing the social tensions and managing the security risks that can result from
Reddick (public administration, U. of Texas-San Antonio) describes the organizational, collaboration, and management elements of homeland security, and examines the implementation of homeland security
In recent years, scholars in international relations and other fields have begun to conceive of security more broadly, moving away from a state-centered concept of national security toward the idea o
This book examines the relationship between women, gender and the international security agenda, exploring the meaning of security in terms of discourse and practice, as well as the larger goals and s
??~Remote Sensing from Space - Supporting International Peace and Security' provides the reader with an overview of the state-of-the-art EO related research in the most relevant topics of security re
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and funda
This book aims to engage with contemporary security discourses from a critical perspective. It argues that rather than being a radical, analytical outlook, much critical security theory fails to fulfi
The 21st century has brought new and challenging dimensions to our understanding of security and migration. The old Cold War framework of security as related to war and peace, international relations
The 21st century has brought new and challenging dimensions to our understanding of security and migration. The old Cold War framework of security as related to war and peace, international relations
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest deve
This book confronts both the maritime security challenges and responses. In Southeast Asia, maritime security has, over the last twenty years, taken on a much greater importance, due to the Law of the
The events of 9/11 and other ongoing terrorist threats have taken interest in national security and border security to a heightened level of concern. An exploration of the trends and transformation of
A framework for formalizing risk management thinking in today?s complex business environment Security Risk Management Body of Knowledge details the security risk management process in a format that c
Risk Management in Port Operations, Logistics and Supply Chain Security is the first book to address security, risk and reliability issues in maritime, port and supply chain settings. In particular th
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect
The Globalization of Security is an important rethinking of the connections between globalization and security, focusing on a conceptual examination of the role of the state combined with key case stu
These are extraordinary times in U.S. national security policy. America remains engaged in both Iraq and Afghanistan while facing a global economic downturn. Homeland security concerns still abound in
Security and Dependability for Ambient Intelligence is the primary publication for the SERENITY approach which provides security and dependability (S&D) solutions for dynamic, highly distributed
This volume provides a coherent and comprehensive understanding of Chinese security policy, comprising essays written by one of America's leading scholars.Chinese Security Policy covers such fundament
This volume provides a coherent and comprehensive understanding of Chinese security policy, comprising essays written by one of America's leading scholars.Chinese Security Policy covers such fundament
Helen James considers security in Myanmar/Burma. She uses the ideas put forward in the United Nations Development Programme's 1994 report, of human, as opposed to state and security, going on to argue
High-Rise Security and Fire Life Safety, Third Edition, is a comprehensive reference for managing security and fire life safety operations within high-rise buildings. It spells out the unique characte
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thi
Of interest to academics and practitioners in computing and security, this collection of current international work explores solutions to problems in cyber security from both national and global persp
CompTIAR Security+ Cert Flash Cards Online SYO-201 Diane Barrett The CompTIA Security+ Cert Flash Cards Online provides a concise review of all objectives on the Security+ SYO-201 exam. Th
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. Th
This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulat
Just a decade ago security had little claim to criminological attention. Today a combination of disciplinary paradigm shifts, policy changes, and world political events have pushed security to the for
Just a decade ago security had little claim to criminological attention. Today a combination of disciplinary paradigm shifts, policy changes, and world political events have pushed security to the for
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological
Specialists in information security with companies that sell such security or companies that buy it, explain and question current and traditional approaches in order to determine their weaknesses and
This concise text presents a focused, well-rounded, and clear-eyed introduction to the concept of human security. Questioning the utility of traditional national-security frameworks in the postDCold W
This concise text presents a focused, well-rounded, and clear-eyed introduction to the concept of human security. Questioning the utility of traditional national-security frameworks in the post–Cold W
CompTIA is revising the popular Security+ exam for the first time since it launched in 2002. This kit includes the key Sybex titles for the new CompTIA Security+ exam: CompTIA Security+ Study Guide, F
A contemporary primer on the leading arguments about U.S. national security,National Security Dilemmas addresses the major challenges and opportunities that are live-issue areas for American policymak
The world's bestselling computer security book--fully expanded and updated "Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline par
This one-semester text discusses all aspects of private security--from recruiting, selecting and training security personnel to testifying in court. Designed to help address the need for more in-depth
Security and other safety issues are more important than ever in the maritime industry. Maritime Safety, Security and Piracy is the first book to discuss safety, security and piracy in the maritime co