Search

Your search keyword '"SECURITY POLICY"' showing total 16,383 results

Search Constraints

Start Over You searched for: Descriptor "SECURITY POLICY" Remove constraint Descriptor: "SECURITY POLICY"
16,383 results on '"SECURITY POLICY"'

Search Results

1. Civil-Military Relations and Antimilitarism in Japan After the End of the Cold War.

2. تأثير السياسة الامنية الاقليمية التركية على الاستقرار السياسي في العراق بعد عام ٢٠٠٣.

3. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

4. Evolution of approaches to defense policy in Japan in the post-war period

5. The protection of 'state overseas interests' in China’s foreign policy strategy: conceptual, legal and expert dimensions of the discussion

6. Iran’s Security Policy in the Caspian Region

7. Security policies and sustainable development in the Western Balkan region beyond 2022: current status, challenges, and prospects

8. The implications of illicit networks for changes in anti-narcotics policies.

9. Security policies and sustainable development in the Western Balkan region beyond 2022: current status, challenges, and prospects.

10. Abkhazia and South Ossetia in the foreign and security policy of the Russian Federation.

11. RETHINKING SECURITY POLICY OF BOSNIA AND HERZEGOVINA AND IMPROVING THE RESPONSE TO CHALLENGES AND THREATS

12. Foreign Fighters and Their Place in Law

13. Automatic generation of AppArmor security policies based on large language models

14. Política de seguridad y necroliberalismo: Ecuador 2024.

15. Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks.

16. A DIGITÁLIS KÜSZÖBÖN: A NATO VÁLASZA A MODERN BIZTONSÁGPOLITIKAI KIHÍVÁSOKRA.

17. Strengthening Network Security in the Cloud: Exploring Cloud-Native Fortifications for Modern Threats.

18. The dual 'dual' policy: Two conceptions of 'deterrence and reassurance' in Norwegian security policy and analyses.

19. Designing around NATO's deterrence: Russia's Nordic information confrontation strategy.

20. Forensic DNA database and criminal investigation in the Sahel region: a need to update the national security policy?

21. 基于大语言模型的AppArmor安全策略自动生成方法.

22. Graph-Powered Mining and Analysis of SELinux Security Policies

23. A SLAHP in the Face of DLL Search Order Hijacking

24. New ASMS Architecture in the Mobile Agent System to Protect the Code and Data of an Agent

25. Self-exclusion as a Security Strategy of Small States

26. Security Policy of Reconstruction Administration in Iran: The Transition from Idealism to Geopolitical Pragmatism

27. Human being in state security policy - theoretical approaches

28. Rethinking change in Japan's security policy: punctuated equilibrium theory and Japan's response to the Russian invasion of Ukraine.

29. Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.

30. ІНФОРМАЦІЯ ЯК ОБ'ЄКТ НАЦІОНАЛЬНОЇ БЕЗПЕКОВОЇ ПОЛІТИКИ УКРАЇНИ

31. Decoding the Intersection of Trade and Security in the EU's Anti-Coercion Instrument.

32. Party politics and foreign policy: The Liberal Democratic Party in Japan's security policy expansion in Southeast Asia.

33. GDPR compliance through standard security controls: An automated approach.

34. Gentlemen, you can't fight in here. Or can you?: How cyberspace operations impact international security.

35. Enemy image? A comparative analysis of the Russian federation's role and position in the leading national security documents of Estonia and the Czech Republic.

36. Japan’s Coast Guard Capacity Building under Abe Shinzō: Between Power, Money and Norms

38. Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats

39. Analysis of information flow security using software implementing business logic based on stored database program blocks

40. Zeitenwende: German Foreign Policy Change in the Wake of Russia's War Against Ukraine.

41. Grasping Foreign and Security Policy Change: Patterns and Conditions of Change Among Liberal Democracies.

42. Role-theoretic discourse analysis of German security policy: a case of German parliamentary debate on the mission in Afghanistan.

43. Norden, Kina og Russland i det globale forskningssamarbeidet.

44. Japan's Coast Guard Capacity Building under Abe Shinzō: Between Power, Money and Norms.

45. RUSSIA'S AGGRESSION IN UKRAINE AS A TURNING POINT: THE TRANSFORMATION OF THE EUROPEAN UNION INTO A SECURITY ACTOR IN THE RECONSTRUCTION OF THE EUROPEAN SECURITY ORDER.

46. CZŁOWIEK W POLITYCE BEZPIECZEŃSTWA PAŃSTWA-UJĘCIA TEORETYCZNE.

47. Framework for Modeling Security Policies of Big Data Processing Systems.

49. Towards Designing Energy-Aware Cybersecurity Policies

Catalog

Books, media, physical & digital resources