Make us homepage
Add to Favorites
FAIL (the browser should render some flash content, not this).

Main page » Tag security

Sort by: date | rating | most visited | comments | alphabetically


Corruption, Global Security, and World Order
6
 
 

Corruption, Global Security, and World OrderCorruption, Global Security, and World Order

This book reveals corruption to be at the very center of these global threats and proposes a combination of remedies such as positive leadership, enhanced transparency, tougher punishment, and enforceable new sanctions against shady activities.
 
  More..
Tags: against, shady, sanctions, enforceable, punishment, World, Corruption, Security, Global, tougher
Ian Fleming - You Only Live Twice (James Bond Novels)
5
 
 
Ian Fleming - You Only Live Twice (James Bond Novels)When Ernst Stavro Blofeld brutally murdered the girl whom James Bond had married only hours before, the zest for life went out of Bond. He went to pieces, was even on the verge of becoming a security risk. M, however, was persuaded to give him one last chance.
 
  More..
Tags: James, chance, persuaded, however, security, becoming
Iran (Creation of the Modern Middle East)
33
 
 
Iran (Creation of the Modern Middle East)Home to one of the world's oldest continuous civilizations, Iran's historical and urban settlements date back to 4000 BCE. Once known for its modern ways influenced by Western culture, the Iran of today is officially an Islamic republic. It occupies a strategic position in international energy security and world economy due to its large reserves of petroleum and natural gas.

Reading level: Ages 9-12
 
  More..
Tags: world, economy, large, security, energy
European Security Culture: Language, Theory, Policy
17
 
 
European Security Culture: Language, Theory, PolicyOrganized around themes of cultural realism and social constructivism, Monica Gariup develops a theoretical framework to enhance our understanding of security culture at the European Union (EU) level. Using tools from political theory, linguistic analysis, and international relations theory, this book's innovative approach examines the implications of discourse and practice in the European Security and Defense Policy (ESDP).
 
  More..
Tags: European Union, security, culture, political theory, linguistic analysis, international relations, Defense Policy, European, theory, Security, Policy, books, Security, relations
Applied Cryptography 2nd ed
24
 
 
Applied Cryptography 2nd edThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography -- the technique of enciphering and deciphering messages -- to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
 
  More..
Tags: cryptography, programmers, computer, security, software