Security Council resolution 1325 was a landmark in collective security, making the link between women's security and international peace and security. This book argues it is time to rethink the way th
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance
Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the m
This book addresses crucial issues in railway infrastructure security, showing how to assess terrorist and criminal threats, design countermeasures and implement effective security strategies. Draws o
Fully revised to cover the 2014 CompTIA Security+ objectives, this is a money-saving self-study bundle with bonus study materialsCompTIA Security+ Certification Bundle, Second Edition offers complete
School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. T
Written by two healthcare information security experts, this is an all-new exam guide for the HealthCare Information Security and Privacy Practitioner exam—the latest certification exam from (ISC)2. C
This book will be the first systematic examination of the role that ethics plays in international security in both theory and practice, and offers the reader a concrete ethics for global security. The
This book will be the first systematic examination of the role that ethics plays in international security in both theory and practice, and offers the reader a concrete ethics for global security. The
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don’t have the resources to hire an in-house sec
In International Law and Changing Perceptions of Security the contributors debate how changing concepts and conceptions of security have affected fields such as the use of force, law of the sea, human
Explanation and Progress in Security Studies asks why Security Studies, as a central area of International Relations, has not experienced scientific progress in the way natural sciences have?and answe
Explanation and Progress in Security Studies asks why Security Studies, as a central area of International Relations, has not experienced scientific progress in the way natural sciences have?and answe
The most complete, current guide to Signaling System #7 (SS7)Fully revised to cover the latest advances in the telecommunications industry, Signaling System # 7, Sixth Edition discusses the impact of
The topics discussed at the NATO Advanced Research Workshop “Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems,
This book examines how critical approaches to security developed in Europe can be used to investigate a Chinese security issue - the case of the Falungong. The past few decades have produced a rich fi
This book further develops the existing migration-security nexus and focuses on the in-depth multi-dimensional dynamics between irregular migration and human security in East Asia. It includes in-dept
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms
The fully revised second edition of the Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. Including contributions from some of the world's
Acknowledging the importance of non traditional security in the wider debate, this book looks at one significant aspect namely, environmental security. The book discusses different issues of theoretic
Critical Security Methods offers a new approach to research methods in critical security studies. It argues that methods are not simply tools to bridge the gap between security theory and security pra
The topics discussed at the NATO Advanced Research Workshop “Nanotechnology in the Security Systems" included nanophysics, nanotechnology, nanomaterials, sensors, biosensors security systems,
Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the subject of corporate security intelligence remains poorly understood. An effe
This book provides innovative thinking from a variety of perspectives on the important human rights, human security, and national security policy issues of today—and how these issues intersect.
This book introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different scale should choose their own methodology of security. With in depth analys
In Social Security for Decision Makers – Charting Your Course to Retirement, Peter Murphy provides his readers with the necessary information to make optimal Social Security benefit decisions. Social
This book focuses on various aspects of maritime security of India. Starting with the changing dimensions of national security, it addresses the issues such as non-traditional threats to security, the
This book examines non-state governance in areas of limited statehood by looking at the security practices of multinational companies. It investigates the everyday security practices of mining compani
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an I
The textbook deals with the issue of tourism security. The text is aimed towards organizations such as law enforcement, hotel management, and theme park security teams. It is divided into nine large s
This interdisciplinary collection places corporate security in a theoretical and global context. Arguing that corporate security is becoming the primary form of security in the twenty-first century an