Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China...
Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Terrorism has consistently dogged this supposedly modern and enlightened age. It has merely adopted new shapes and forms in keeping with the times. The causes have also evolved over the years, as old problems are solved and new ones created. Moreover, it has gone high-tech, like everything else. Thus, as this book convincingly shows, terrorism will...
Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon...

Nanoscale Devices - Fundamentals and Applications (NATO Science Series II: Mathematics, Physics and Chemistry)
Nanoscale Devices - Fundamentals and Applications (NATO Science Series II: Mathematics, Physics and Chemistry)
Over the last decade the interest in nanoscale materials and their applications in novel electronic devices have been increasing tremendously. This is caused by the unique properties of nanoscale materials and the outstanding performance of nanoscale devices. The fascinating and often unrivalled properties of nanoscale materials and devices opened...
A Global Security Triangle: European, African and Asian interaction (Routledge/GARNET series: Europe in the World)
A Global Security Triangle: European, African and Asian interaction (Routledge/GARNET series: Europe in the World)

This book considers the interactions between Africa, Asia and Europe, analysing the short and long term strategies various states have adopted to external relations.

The urgency attached to the agenda of international terrorism and human and drugs- trafficking has forced the European Union into new cooperation with Africa and Asia. These...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Advances in Artificial Intelligence for Privacy Protection and Security
Advances in Artificial Intelligence for Privacy Protection and Security

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,...

Medical Response to Terrorism: Preparedness and Clinical Practice
Medical Response to Terrorism: Preparedness and Clinical Practice
Even two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security,...
International Marketing
International Marketing
Thank you for reading our book! Practicing international marketing and writing a text on the subject have much in common. The focus is on delighting the customer; it is a lot of work; the competition is tough; and it’s fun to succeed. It is therefore with great pleasure that we present the eighth edition of International...
Shipping Interdiction and the Law of the Sea (Cambridge Studies in International and Comparative Law)
Shipping Interdiction and the Law of the Sea (Cambridge Studies in International and Comparative Law)
In this comparative study of shipping interdiction, Douglas Guilfoyle considers the State action of stopping, searching and arresting foreign flag vessels and crew on the high seas in cases such as piracy, slavery, drug smuggling, fisheries management, migrant smuggling, the proliferation of weapons of mass destruction and maritime terrorism....
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed...
Forensic Computer Crime Investigation
Forensic Computer Crime Investigation
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy