Colonial Effects The object of this study is the production of national identity and national culture within Jordan as both a typical and an atypical postcolonial nation-state. Recent studies of nationalism describe the nation as “invented”1 or “imagined,”2 by intellectuals and/or political elites who are producers of, or produced by, the... Security Assessment: Case Studies for Implementing the NSA IAM The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... Dengue Virus (Current Topics in Microbiology and Immunology)
Scientific research on dengue has a long and rich history. The literature has been touched by famous names in medicine- Benjamin Rush, Walter Reed, and Albert Sabin, to name a very few- and has been fertile ground for medical historians . The advances made in those early investigations are all the more remarkable for the limited tools available...
North Korea: The Struggle Against American Power
George W. Bush's infamous remark about the 'Axis of Evil' brought North Korea dramatically back into the international spotlight. During the late 1990s relations between North Korea and the US and its allies were on the mend. However, the election of George W. Bush resulted in renewed crisis. The nuclear accord between the two... Cryptography: A Very Short Introduction
We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...
Biometric Recognition: Challenges and Opportunities
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...
|Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |