Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Threats to the security). Showing records 1 – 30 of 84311 total matches.

[1] [2] [3] [4] [5] … [2811]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Mykolas Romeris University

1. Sakalauskytė, Vilma. Europos Sąjunga ir Baltarusija: iššūkiai Europos saugumui.

Degree: Master, Political Sciences, 2009, Mykolas Romeris University

Magistro baigiamajame darbe išanalizuota saugumo samprata, Europos Sąjungos ir Baltarusijos santykiai bei Baltarusijos keliamos grėsmės Europos Sąjungai. Pirmojoje darbo dalyje teoriniu aspektu tiriama saugumo samprata,… (more)

Subjects/Keywords: ES saugumas; Tarptautiniai santykiai; Grėsmės saugumui; Nedemokratinis režimas; ES – Baltarusijos – Lietuvos bendradarbiavimas; European Union security; International relations; Threats to the security; Undemocratic regime; The collaboration on the European Union – Belarus – Lithuania

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sakalauskytė, Vilma. (2009). Europos Sąjunga ir Baltarusija: iššūkiai Europos saugumui. (Masters Thesis). Mykolas Romeris University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2008~D_20090122_111025-25847 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Sakalauskytė, Vilma. “Europos Sąjunga ir Baltarusija: iššūkiai Europos saugumui.” 2009. Masters Thesis, Mykolas Romeris University. Accessed August 03, 2020. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2008~D_20090122_111025-25847 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Sakalauskytė, Vilma. “Europos Sąjunga ir Baltarusija: iššūkiai Europos saugumui.” 2009. Web. 03 Aug 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Sakalauskytė, Vilma. Europos Sąjunga ir Baltarusija: iššūkiai Europos saugumui. [Internet] [Masters thesis]. Mykolas Romeris University; 2009. [cited 2020 Aug 03]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2008~D_20090122_111025-25847 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Sakalauskytė, Vilma. Europos Sąjunga ir Baltarusija: iššūkiai Europos saugumui. [Masters Thesis]. Mykolas Romeris University; 2009. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2008~D_20090122_111025-25847 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Nairobi

2. Lukorito, Graham M. Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) .

Degree: 2011, University of Nairobi

 Governments all over the world are embracing ICT to provide better services to the public. This use of information Technology has transformed the traditional form… (more)

Subjects/Keywords: Information security threats; E-government initiatives at the Kenya Revenue Authority (KRA)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lukorito, G. M. (2011). Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/12428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lukorito, Graham M. “Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) .” 2011. Thesis, University of Nairobi. Accessed August 03, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/12428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lukorito, Graham M. “Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) .” 2011. Web. 03 Aug 2020.

Vancouver:

Lukorito GM. Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) . [Internet] [Thesis]. University of Nairobi; 2011. [cited 2020 Aug 03]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/12428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lukorito GM. Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) . [Thesis]. University of Nairobi; 2011. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/12428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Yadav, Bijender Singh. An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business).

Degree: Computer Sciences, 2013, Shri Jagdishprasad Jhabarmal Tibarewala University

With the move to an e-business mode, the number of users involved in business operations has increased and these users need access to the organizational… (more)

Subjects/Keywords: Electronic Business; Security threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yadav, B. S. (2013). An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business). (Thesis). Shri Jagdishprasad Jhabarmal Tibarewala University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/10052

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yadav, Bijender Singh. “An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business).” 2013. Thesis, Shri Jagdishprasad Jhabarmal Tibarewala University. Accessed August 03, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/10052.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yadav, Bijender Singh. “An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business).” 2013. Web. 03 Aug 2020.

Vancouver:

Yadav BS. An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business). [Internet] [Thesis]. Shri Jagdishprasad Jhabarmal Tibarewala University; 2013. [cited 2020 Aug 03]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10052.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yadav BS. An application of security threats on electronic business (A descriptive study of Internet users doing Electronic Business). [Thesis]. Shri Jagdishprasad Jhabarmal Tibarewala University; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10052

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

4. Stieper, Erica Marie. The Discursive Construction of National Security Threats from 2001-2018.

Degree: MA, Political Science, 2018, Virginia Tech

 This thesis seeks to explain the discursive construction of national security threats facing the United States from 2001-2018. The driving argument is that the nation's… (more)

Subjects/Keywords: Presidential Rhetoric; National Security Threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stieper, E. M. (2018). The Discursive Construction of National Security Threats from 2001-2018. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83827

Chicago Manual of Style (16th Edition):

Stieper, Erica Marie. “The Discursive Construction of National Security Threats from 2001-2018.” 2018. Masters Thesis, Virginia Tech. Accessed August 03, 2020. http://hdl.handle.net/10919/83827.

MLA Handbook (7th Edition):

Stieper, Erica Marie. “The Discursive Construction of National Security Threats from 2001-2018.” 2018. Web. 03 Aug 2020.

Vancouver:

Stieper EM. The Discursive Construction of National Security Threats from 2001-2018. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/10919/83827.

Council of Science Editors:

Stieper EM. The Discursive Construction of National Security Threats from 2001-2018. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83827


University of Victoria

5. Almowuena, Saleh. Key establishment for wireless sensor networks using third parties.

Degree: Dept. of Electrical and Computer Engineering, 2011, University of Victoria

 Wireless sensor networks are employed in a wide range of applications including disaster relief operations, forest-fire detection, battlefield surveillance, pollution measurement, and healthcare applications. Because… (more)

Subjects/Keywords: security threats; cryptography; cryptographic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almowuena, S. (2011). Key establishment for wireless sensor networks using third parties. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/3625

Chicago Manual of Style (16th Edition):

Almowuena, Saleh. “Key establishment for wireless sensor networks using third parties.” 2011. Masters Thesis, University of Victoria. Accessed August 03, 2020. http://hdl.handle.net/1828/3625.

MLA Handbook (7th Edition):

Almowuena, Saleh. “Key establishment for wireless sensor networks using third parties.” 2011. Web. 03 Aug 2020.

Vancouver:

Almowuena S. Key establishment for wireless sensor networks using third parties. [Internet] [Masters thesis]. University of Victoria; 2011. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/1828/3625.

Council of Science Editors:

Almowuena S. Key establishment for wireless sensor networks using third parties. [Masters Thesis]. University of Victoria; 2011. Available from: http://hdl.handle.net/1828/3625


Tampere University

6. Shayan, Fatemeh. Security Complex in the Persian Gulf in the aftermath of the Iraq War .

Degree: 2014, Tampere University

 Tässä tutkimuksessa tarkastellaan Yhdysvaltojen vuonna 2003 Irakiin tekemän hyökkäyksen aiheuttamia muutoksia Persianlahden alueen turvallisuuskompleksiin. Persianlahden alueen turvallisuutta tarkastellaan usein alueen valtioiden muodostaman strategisen tasapainon, Saudi… (more)

Subjects/Keywords: Persianlahden turvallisuuskompleksi; turvallisuusmuutos; yhteiskunnalliset uhkat; Persian Gulf security complex; security shift; societal threats; process tracing; the 2003 Iraq War

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shayan, F. (2014). Security Complex in the Persian Gulf in the aftermath of the Iraq War . (Doctoral Dissertation). Tampere University. Retrieved from https://trepo.tuni.fi/handle/10024/96356

Chicago Manual of Style (16th Edition):

Shayan, Fatemeh. “Security Complex in the Persian Gulf in the aftermath of the Iraq War .” 2014. Doctoral Dissertation, Tampere University. Accessed August 03, 2020. https://trepo.tuni.fi/handle/10024/96356.

MLA Handbook (7th Edition):

Shayan, Fatemeh. “Security Complex in the Persian Gulf in the aftermath of the Iraq War .” 2014. Web. 03 Aug 2020.

Vancouver:

Shayan F. Security Complex in the Persian Gulf in the aftermath of the Iraq War . [Internet] [Doctoral dissertation]. Tampere University; 2014. [cited 2020 Aug 03]. Available from: https://trepo.tuni.fi/handle/10024/96356.

Council of Science Editors:

Shayan F. Security Complex in the Persian Gulf in the aftermath of the Iraq War . [Doctoral Dissertation]. Tampere University; 2014. Available from: https://trepo.tuni.fi/handle/10024/96356


Univerzitet u Beogradu

7. Bajagić, Mladen. Изазови и претње у измењеном контексту безбедности.

Degree: Fakultet političkih nauka, 2016, Univerzitet u Beogradu

 Измењена природа традиционалних и савремених изазова и претњи безбедности крајем XX и почетком XXI века, пресудно су утицали да су унутар међународних односа и науке… (more)

Subjects/Keywords: security; national security; individual security; societal security; regional security; international security (balance of power and collective security); global security; cooperative security; international relations; security studies; challenges and threats to security; terrorism; organized crime; conflict; weapons of mass destruction; identity; environmental problems; globalization; fragmentation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bajagić, M. (2016). Изазови и претње у измењеном контексту безбедности. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorakg.kg.ac.rs/fedora/get/o:10872/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bajagić, Mladen. “Изазови и претње у измењеном контексту безбедности.” 2016. Thesis, Univerzitet u Beogradu. Accessed August 03, 2020. https://fedorakg.kg.ac.rs/fedora/get/o:10872/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bajagić, Mladen. “Изазови и претње у измењеном контексту безбедности.” 2016. Web. 03 Aug 2020.

Vancouver:

Bajagić M. Изазови и претње у измењеном контексту безбедности. [Internet] [Thesis]. Univerzitet u Beogradu; 2016. [cited 2020 Aug 03]. Available from: https://fedorakg.kg.ac.rs/fedora/get/o:10872/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bajagić M. Изазови и претње у измењеном контексту безбедности. [Thesis]. Univerzitet u Beogradu; 2016. Available from: https://fedorakg.kg.ac.rs/fedora/get/o:10872/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

8. Matunda, A. K. Utilizing The Traditional Justice System To Guarantee The Right To Security Of The People Of Marsabit County Under The 2010 Constitution .

Degree: 2016, University of Nairobi

 The Constitution of Kenya 2010 bestows upon the government the mandate to guarantee the rights and fundamental freedoms of the people of Kenya under the… (more)

Subjects/Keywords: Traditional Justice System To Guarantee The Right To Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Matunda, A. K. (2016). Utilizing The Traditional Justice System To Guarantee The Right To Security Of The People Of Marsabit County Under The 2010 Constitution . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/97094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Matunda, A K. “Utilizing The Traditional Justice System To Guarantee The Right To Security Of The People Of Marsabit County Under The 2010 Constitution .” 2016. Thesis, University of Nairobi. Accessed August 03, 2020. http://hdl.handle.net/11295/97094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Matunda, A K. “Utilizing The Traditional Justice System To Guarantee The Right To Security Of The People Of Marsabit County Under The 2010 Constitution .” 2016. Web. 03 Aug 2020.

Vancouver:

Matunda AK. Utilizing The Traditional Justice System To Guarantee The Right To Security Of The People Of Marsabit County Under The 2010 Constitution . [Internet] [Thesis]. University of Nairobi; 2016. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/11295/97094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Matunda AK. Utilizing The Traditional Justice System To Guarantee The Right To Security Of The People Of Marsabit County Under The 2010 Constitution . [Thesis]. University of Nairobi; 2016. Available from: http://hdl.handle.net/11295/97094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

9. Brow, Stephanie Lynn. The California Independent System Operator security vulnerabilities.

Degree: MS, Criminal Justice, 2010, California State University – Sacramento

 Our country is still in the early stages of the 21st century where technology is advancing on a daily basis allowing the threat of terrorism,… (more)

Subjects/Keywords: Critical infrastructures; Terrorist attacks; Site security plans; Cyber threats; Response to security breach

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brow, S. L. (2010). The California Independent System Operator security vulnerabilities. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/626

Chicago Manual of Style (16th Edition):

Brow, Stephanie Lynn. “The California Independent System Operator security vulnerabilities.” 2010. Masters Thesis, California State University – Sacramento. Accessed August 03, 2020. http://hdl.handle.net/10211.9/626.

MLA Handbook (7th Edition):

Brow, Stephanie Lynn. “The California Independent System Operator security vulnerabilities.” 2010. Web. 03 Aug 2020.

Vancouver:

Brow SL. The California Independent System Operator security vulnerabilities. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/10211.9/626.

Council of Science Editors:

Brow SL. The California Independent System Operator security vulnerabilities. [Masters Thesis]. California State University – Sacramento; 2010. Available from: http://hdl.handle.net/10211.9/626


Brno University of Technology

10. Sedlář, Petr. Ochrana datové sítě s využitím NetFlow dat: Network Protection Using NetFlow Data.

Degree: 2019, Brno University of Technology

 This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a… (more)

Subjects/Keywords: NetFlow; IPFIX; Bezpečnostní hrozby; Spam; IP telefonie; Peer-to-peer sítě; SQL; NetFlow; IPFIX; Security threats; Spam; Voice over IP; Peer-to-peer networks; SQL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sedlář, P. (2019). Ochrana datové sítě s využitím NetFlow dat: Network Protection Using NetFlow Data. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sedlář, Petr. “Ochrana datové sítě s využitím NetFlow dat: Network Protection Using NetFlow Data.” 2019. Thesis, Brno University of Technology. Accessed August 03, 2020. http://hdl.handle.net/11012/54334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sedlář, Petr. “Ochrana datové sítě s využitím NetFlow dat: Network Protection Using NetFlow Data.” 2019. Web. 03 Aug 2020.

Vancouver:

Sedlář P. Ochrana datové sítě s využitím NetFlow dat: Network Protection Using NetFlow Data. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/11012/54334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sedlář P. Ochrana datové sítě s využitím NetFlow dat: Network Protection Using NetFlow Data. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/54334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

11. Leitão, Vitor Manuel Carujo. IPv6- A new security challenge.

Degree: 2011, Universidade de Lisboa

 IPv6 was developed to address the exhaustion of IPv4 addresses, but has not yet seen global deployment. Recent trends are now finally changing this picture… (more)

Subjects/Keywords: Threats; Vulnerabilities; Security; Best Practices; IPv6

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Leitão, V. M. C. (2011). IPv6- A new security challenge. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13928

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Leitão, Vitor Manuel Carujo. “IPv6- A new security challenge.” 2011. Thesis, Universidade de Lisboa. Accessed August 03, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13928.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Leitão, Vitor Manuel Carujo. “IPv6- A new security challenge.” 2011. Web. 03 Aug 2020.

Vancouver:

Leitão VMC. IPv6- A new security challenge. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2020 Aug 03]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13928.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Leitão VMC. IPv6- A new security challenge. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13928

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Univerzitet u Beogradu

12. Vasović,Ilija R., 1980-. Вехабизам као пријетња регионалној безбједности Балканa.

Degree: Fakultet bezbednosti, 2018, Univerzitet u Beogradu

Интегрисане, интердисциплинарне и мултидисциплинарне студије - Студије безбедности / Integrated, interdisciplinary and multidisciplinary studies - Security studies

Предмет истраживања у овој докторској дисертацији су безбедносни… (more)

Subjects/Keywords: Wahhabism; Wahabbis; Salafis; Islam; threats; security; Montenegro

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vasović,Ilija R., 1. (2018). Вехабизам као пријетња регионалној безбједности Балканa. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:18008/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vasović,Ilija R., 1980-. “Вехабизам као пријетња регионалној безбједности Балканa.” 2018. Thesis, Univerzitet u Beogradu. Accessed August 03, 2020. https://fedorabg.bg.ac.rs/fedora/get/o:18008/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vasović,Ilija R., 1980-. “Вехабизам као пријетња регионалној безбједности Балканa.” 2018. Web. 03 Aug 2020.

Vancouver:

Vasović,Ilija R. 1. Вехабизам као пријетња регионалној безбједности Балканa. [Internet] [Thesis]. Univerzitet u Beogradu; 2018. [cited 2020 Aug 03]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18008/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vasović,Ilija R. 1. Вехабизам као пријетња регионалној безбједности Балканa. [Thesis]. Univerzitet u Beogradu; 2018. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18008/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

13. Ghazi, Galia. Modeling and experimental validation for 3D mm-wave radar imaging.

Degree: PhD, Department of Electrical and Computer Engineering, 2017, Northeastern University

 As the problem of identifying suicide bombers wearing explosives concealed under clothing becomes increasingly important, it becomes essential to detect suspicious individuals at a distance.… (more)

Subjects/Keywords: imaging; high-resolution radar systems; security threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghazi, G. (2017). Modeling and experimental validation for 3D mm-wave radar imaging. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20260288

Chicago Manual of Style (16th Edition):

Ghazi, Galia. “Modeling and experimental validation for 3D mm-wave radar imaging.” 2017. Doctoral Dissertation, Northeastern University. Accessed August 03, 2020. http://hdl.handle.net/2047/D20260288.

MLA Handbook (7th Edition):

Ghazi, Galia. “Modeling and experimental validation for 3D mm-wave radar imaging.” 2017. Web. 03 Aug 2020.

Vancouver:

Ghazi G. Modeling and experimental validation for 3D mm-wave radar imaging. [Internet] [Doctoral dissertation]. Northeastern University; 2017. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/2047/D20260288.

Council of Science Editors:

Ghazi G. Modeling and experimental validation for 3D mm-wave radar imaging. [Doctoral Dissertation]. Northeastern University; 2017. Available from: http://hdl.handle.net/2047/D20260288


Universidade do Rio Grande do Sul

14. Piletti, Felipe José. Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais.

Degree: 2008, Universidade do Rio Grande do Sul

As grandes guerras da Idade Moderna foram, em sua maioria, travadas por inimigos que se organizavam sob a forma de Estado-nação. Após o final da… (more)

Subjects/Keywords: Segurança internacional; International security; Security and defense in south america; Exército brasileiro; América Latina; Asymmetric warfare; Amazônia; Non-traditional threats; The Amazon; Brazilian army

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Piletti, F. J. (2008). Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/14386

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Piletti, Felipe José. “Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais.” 2008. Thesis, Universidade do Rio Grande do Sul. Accessed August 03, 2020. http://hdl.handle.net/10183/14386.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Piletti, Felipe José. “Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais.” 2008. Web. 03 Aug 2020.

Vancouver:

Piletti FJ. Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2008. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/10183/14386.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Piletti FJ. Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais. [Thesis]. Universidade do Rio Grande do Sul; 2008. Available from: http://hdl.handle.net/10183/14386

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

15. Elmrabit, Nebrase. A multiple-perspective approach for insider-threat risk prediction in cyber-security.

Degree: PhD, 2018, Loughborough University

 Currently governments and research communities are concentrating on insider threat matters more than ever, the main reason for this is that the effect of a… (more)

Subjects/Keywords: Cyber-security insider-threats; Privileged user abuse; Multiple-perspective approach; Insider-threats predictions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elmrabit, N. (2018). A multiple-perspective approach for insider-threat risk prediction in cyber-security. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/36243

Chicago Manual of Style (16th Edition):

Elmrabit, Nebrase. “A multiple-perspective approach for insider-threat risk prediction in cyber-security.” 2018. Doctoral Dissertation, Loughborough University. Accessed August 03, 2020. http://hdl.handle.net/2134/36243.

MLA Handbook (7th Edition):

Elmrabit, Nebrase. “A multiple-perspective approach for insider-threat risk prediction in cyber-security.” 2018. Web. 03 Aug 2020.

Vancouver:

Elmrabit N. A multiple-perspective approach for insider-threat risk prediction in cyber-security. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/2134/36243.

Council of Science Editors:

Elmrabit N. A multiple-perspective approach for insider-threat risk prediction in cyber-security. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/36243


University of Waikato

16. Rothery, Christopher Dean. New Zealand's national security framework: A recommendation for the development of a national security strategy .

Degree: 2018, University of Waikato

 New Zealand’s national security system is based upon a collection of siloed plans and policies. New Zealand has adopted an ‘all-hazards/all-risks’ approach to national security(more)

Subjects/Keywords: Government; National Security; New Zealand; Policy; Security Threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rothery, C. D. (2018). New Zealand's national security framework: A recommendation for the development of a national security strategy . (Masters Thesis). University of Waikato. Retrieved from http://hdl.handle.net/10289/12296

Chicago Manual of Style (16th Edition):

Rothery, Christopher Dean. “New Zealand's national security framework: A recommendation for the development of a national security strategy .” 2018. Masters Thesis, University of Waikato. Accessed August 03, 2020. http://hdl.handle.net/10289/12296.

MLA Handbook (7th Edition):

Rothery, Christopher Dean. “New Zealand's national security framework: A recommendation for the development of a national security strategy .” 2018. Web. 03 Aug 2020.

Vancouver:

Rothery CD. New Zealand's national security framework: A recommendation for the development of a national security strategy . [Internet] [Masters thesis]. University of Waikato; 2018. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/10289/12296.

Council of Science Editors:

Rothery CD. New Zealand's national security framework: A recommendation for the development of a national security strategy . [Masters Thesis]. University of Waikato; 2018. Available from: http://hdl.handle.net/10289/12296


University of Manchester

17. Adediran, Bolarinwa Kayode. REFORMING THE AUTHORISING MECHANISM FOR INTERVENTION: HOW CAN THE RESPONSIBILITY TO PROTECT BE ACHIEVED?.

Degree: 2018, University of Manchester

 This thesis considers how the international response to egregious crimes can be made more consistent and effective. It focuses in particular on the Security Council… (more)

Subjects/Keywords: The Responsibility to Protect; The Security Council; Regional Organisations; Humanitarian Intervention; Veto

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adediran, B. K. (2018). REFORMING THE AUTHORISING MECHANISM FOR INTERVENTION: HOW CAN THE RESPONSIBILITY TO PROTECT BE ACHIEVED?. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:316703

Chicago Manual of Style (16th Edition):

Adediran, Bolarinwa Kayode. “REFORMING THE AUTHORISING MECHANISM FOR INTERVENTION: HOW CAN THE RESPONSIBILITY TO PROTECT BE ACHIEVED?.” 2018. Doctoral Dissertation, University of Manchester. Accessed August 03, 2020. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:316703.

MLA Handbook (7th Edition):

Adediran, Bolarinwa Kayode. “REFORMING THE AUTHORISING MECHANISM FOR INTERVENTION: HOW CAN THE RESPONSIBILITY TO PROTECT BE ACHIEVED?.” 2018. Web. 03 Aug 2020.

Vancouver:

Adediran BK. REFORMING THE AUTHORISING MECHANISM FOR INTERVENTION: HOW CAN THE RESPONSIBILITY TO PROTECT BE ACHIEVED?. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2020 Aug 03]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:316703.

Council of Science Editors:

Adediran BK. REFORMING THE AUTHORISING MECHANISM FOR INTERVENTION: HOW CAN THE RESPONSIBILITY TO PROTECT BE ACHIEVED?. [Doctoral Dissertation]. University of Manchester; 2018. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:316703


University of Manchester

18. Adediran, Bolarinwa. Reforming the authorising mechanism for intervention : how can the responsibility to protect be achieved?.

Degree: PhD, 2018, University of Manchester

 This thesis considers how the international response to egregious crimes can be made more consistent and effective. It focuses in particular on the Security Council… (more)

Subjects/Keywords: 320; Veto; Humanitarian Intervention; The Security Council; The Responsibility to Protect; Regional Organisations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adediran, B. (2018). Reforming the authorising mechanism for intervention : how can the responsibility to protect be achieved?. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/reforming-the-authorising-mechanism-for-intervention-how-can-the-responsibility-to-protect-be-achieved(330f8a40-4256-4031-a017-b90ca8de9d3b).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.764735

Chicago Manual of Style (16th Edition):

Adediran, Bolarinwa. “Reforming the authorising mechanism for intervention : how can the responsibility to protect be achieved?.” 2018. Doctoral Dissertation, University of Manchester. Accessed August 03, 2020. https://www.research.manchester.ac.uk/portal/en/theses/reforming-the-authorising-mechanism-for-intervention-how-can-the-responsibility-to-protect-be-achieved(330f8a40-4256-4031-a017-b90ca8de9d3b).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.764735.

MLA Handbook (7th Edition):

Adediran, Bolarinwa. “Reforming the authorising mechanism for intervention : how can the responsibility to protect be achieved?.” 2018. Web. 03 Aug 2020.

Vancouver:

Adediran B. Reforming the authorising mechanism for intervention : how can the responsibility to protect be achieved?. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2020 Aug 03]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/reforming-the-authorising-mechanism-for-intervention-how-can-the-responsibility-to-protect-be-achieved(330f8a40-4256-4031-a017-b90ca8de9d3b).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.764735.

Council of Science Editors:

Adediran B. Reforming the authorising mechanism for intervention : how can the responsibility to protect be achieved?. [Doctoral Dissertation]. University of Manchester; 2018. Available from: https://www.research.manchester.ac.uk/portal/en/theses/reforming-the-authorising-mechanism-for-intervention-how-can-the-responsibility-to-protect-be-achieved(330f8a40-4256-4031-a017-b90ca8de9d3b).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.764735


University of Texas – Austin

19. Martinez Espinosa, Cesar Alfredo. Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach.

Degree: PhD, Public Policy, 2013, University of Texas – Austin

 In a more complex and interdependent world, nations face new challenges that threaten their national security. National security should not be understood exclusively in the… (more)

Subjects/Keywords: Mexico; National security; International security; Public safety; National security strategy; Cyber security; Disaster preparedness; Security risks; Security threats; Interdependency; Globalization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martinez Espinosa, C. A. (2013). Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/23031

Chicago Manual of Style (16th Edition):

Martinez Espinosa, Cesar Alfredo. “Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach.” 2013. Doctoral Dissertation, University of Texas – Austin. Accessed August 03, 2020. http://hdl.handle.net/2152/23031.

MLA Handbook (7th Edition):

Martinez Espinosa, Cesar Alfredo. “Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach.” 2013. Web. 03 Aug 2020.

Vancouver:

Martinez Espinosa CA. Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2013. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/2152/23031.

Council of Science Editors:

Martinez Espinosa CA. Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach. [Doctoral Dissertation]. University of Texas – Austin; 2013. Available from: http://hdl.handle.net/2152/23031

20. Nia, ; Mganga, Ramadianti Putri;. Enhancing Information Security in Cloud Computing Services using SLA based metrics.

Degree: 2011, , School of Computing

  Context: Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations… (more)

Subjects/Keywords: cloud computing; security metrics; security threats; security measurement frameworks; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nia, ; Mganga, R. P. (2011). Enhancing Information Security in Cloud Computing Services using SLA based metrics. (Thesis). , School of Computing. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nia, ; Mganga, Ramadianti Putri;. “Enhancing Information Security in Cloud Computing Services using SLA based metrics.” 2011. Thesis, , School of Computing. Accessed August 03, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nia, ; Mganga, Ramadianti Putri;. “Enhancing Information Security in Cloud Computing Services using SLA based metrics.” 2011. Web. 03 Aug 2020.

Vancouver:

Nia, ; Mganga RP. Enhancing Information Security in Cloud Computing Services using SLA based metrics. [Internet] [Thesis]. , School of Computing; 2011. [cited 2020 Aug 03]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nia, ; Mganga RP. Enhancing Information Security in Cloud Computing Services using SLA based metrics. [Thesis]. , School of Computing; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

21. Hayes, Garrett. Using detection in depth to counter SCADA-specific advanced persistent threats.

Degree: 2014, University of Ontario Institute of Technology

 A heavy focus has recently been placed on the current state of each country???s critical infrastructure security. Unfortunately, widely deployed supervisory control and data acquisition… (more)

Subjects/Keywords: Industrial control security; SCADA security; Advanced persistent threats; Intrusion detection; Intrusion prevention; Critical infrastructure security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hayes, G. (2014). Using detection in depth to counter SCADA-specific advanced persistent threats. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hayes, Garrett. “Using detection in depth to counter SCADA-specific advanced persistent threats.” 2014. Thesis, University of Ontario Institute of Technology. Accessed August 03, 2020. http://hdl.handle.net/10155/889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hayes, Garrett. “Using detection in depth to counter SCADA-specific advanced persistent threats.” 2014. Web. 03 Aug 2020.

Vancouver:

Hayes G. Using detection in depth to counter SCADA-specific advanced persistent threats. [Internet] [Thesis]. University of Ontario Institute of Technology; 2014. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/10155/889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hayes G. Using detection in depth to counter SCADA-specific advanced persistent threats. [Thesis]. University of Ontario Institute of Technology; 2014. Available from: http://hdl.handle.net/10155/889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

22. Mahlatsi, Lehlohonolo Wonderboy. An exploration of the chasm in the protection of classified information in South African government departments .

Degree: 2019, University of South Africa

 The chasm in the protection of classified information in South African government indicates that all the departments have at their disposal information that is to… (more)

Subjects/Keywords: Classified information; Confidential; Protection of security; Restricted; Screcy; Security threats; South African Government Departments; Threats; Top-secret

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahlatsi, L. W. (2019). An exploration of the chasm in the protection of classified information in South African government departments . (Masters Thesis). University of South Africa. Retrieved from http://uir.unisa.ac.za/handle/10500/25690

Chicago Manual of Style (16th Edition):

Mahlatsi, Lehlohonolo Wonderboy. “An exploration of the chasm in the protection of classified information in South African government departments .” 2019. Masters Thesis, University of South Africa. Accessed August 03, 2020. http://uir.unisa.ac.za/handle/10500/25690.

MLA Handbook (7th Edition):

Mahlatsi, Lehlohonolo Wonderboy. “An exploration of the chasm in the protection of classified information in South African government departments .” 2019. Web. 03 Aug 2020.

Vancouver:

Mahlatsi LW. An exploration of the chasm in the protection of classified information in South African government departments . [Internet] [Masters thesis]. University of South Africa; 2019. [cited 2020 Aug 03]. Available from: http://uir.unisa.ac.za/handle/10500/25690.

Council of Science Editors:

Mahlatsi LW. An exploration of the chasm in the protection of classified information in South African government departments . [Masters Thesis]. University of South Africa; 2019. Available from: http://uir.unisa.ac.za/handle/10500/25690


University of Pretoria

23. Mabanga, Silingile Portia. South Africa's official external threat perceptions : 1994-2012.

Degree: MSecurity Studies, Political Sciences, 2013, University of Pretoria

 The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it… (more)

Subjects/Keywords: South Africa; Security; National security; Human security; Security issues; Security risks; Threat perceptions; Traditional military threats; Non-traditional, non-military threats; Securitisation; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mabanga, S. P. (2013). South Africa's official external threat perceptions : 1994-2012. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/43680

Chicago Manual of Style (16th Edition):

Mabanga, Silingile Portia. “South Africa's official external threat perceptions : 1994-2012.” 2013. Masters Thesis, University of Pretoria. Accessed August 03, 2020. http://hdl.handle.net/2263/43680.

MLA Handbook (7th Edition):

Mabanga, Silingile Portia. “South Africa's official external threat perceptions : 1994-2012.” 2013. Web. 03 Aug 2020.

Vancouver:

Mabanga SP. South Africa's official external threat perceptions : 1994-2012. [Internet] [Masters thesis]. University of Pretoria; 2013. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/2263/43680.

Council of Science Editors:

Mabanga SP. South Africa's official external threat perceptions : 1994-2012. [Masters Thesis]. University of Pretoria; 2013. Available from: http://hdl.handle.net/2263/43680


University of Utah

24. Kardas, Saban. Regions, powers and secondary state bandwagoning under unipolarity: the case of Turkish-American relations.

Degree: PhD, Political Science;, 2010, University of Utah

 Why do secondary powers cooperate with the United States in the post-Cold War unipolar international system and what factors determine their level and type of… (more)

Subjects/Keywords: Alliances; Bandwagoning; Indirect threats; Regional security complexes; Turkish-American relations; Unipolarity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kardas, S. (2010). Regions, powers and secondary state bandwagoning under unipolarity: the case of Turkish-American relations. (Doctoral Dissertation). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1170/rec/962

Chicago Manual of Style (16th Edition):

Kardas, Saban. “Regions, powers and secondary state bandwagoning under unipolarity: the case of Turkish-American relations.” 2010. Doctoral Dissertation, University of Utah. Accessed August 03, 2020. http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1170/rec/962.

MLA Handbook (7th Edition):

Kardas, Saban. “Regions, powers and secondary state bandwagoning under unipolarity: the case of Turkish-American relations.” 2010. Web. 03 Aug 2020.

Vancouver:

Kardas S. Regions, powers and secondary state bandwagoning under unipolarity: the case of Turkish-American relations. [Internet] [Doctoral dissertation]. University of Utah; 2010. [cited 2020 Aug 03]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1170/rec/962.

Council of Science Editors:

Kardas S. Regions, powers and secondary state bandwagoning under unipolarity: the case of Turkish-American relations. [Doctoral Dissertation]. University of Utah; 2010. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1170/rec/962

25. Hale, Donald M. U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?.

Degree: 2014, Johns Hopkins University

 On September 28, 1991, President George H. W. Bush directed all nuclear bomber aircraft to “stand down” from day-to-day alert and download their nuclear weapons… (more)

Subjects/Keywords: Cold War; Nuclear Triad; Nuclear Weapons; Nuclear Security Summit; Threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hale, D. M. (2014). U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?. (Thesis). Johns Hopkins University. Retrieved from http://jhir.library.jhu.edu/handle/1774.2/37599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hale, Donald M. “U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?.” 2014. Thesis, Johns Hopkins University. Accessed August 03, 2020. http://jhir.library.jhu.edu/handle/1774.2/37599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hale, Donald M. “U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?.” 2014. Web. 03 Aug 2020.

Vancouver:

Hale DM. U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?. [Internet] [Thesis]. Johns Hopkins University; 2014. [cited 2020 Aug 03]. Available from: http://jhir.library.jhu.edu/handle/1774.2/37599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hale DM. U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?. [Thesis]. Johns Hopkins University; 2014. Available from: http://jhir.library.jhu.edu/handle/1774.2/37599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Hale, Donald M. U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?.

Degree: 2014, Johns Hopkins University

 On September 28, 1991, President George H. W. Bush directed all nuclear bomber aircraft to “stand down” from day-to-day alert and download their nuclear weapons… (more)

Subjects/Keywords: Nuclear Triad; Cold War; Nuclear Weapons; Nuclear Security Summit; Threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hale, D. M. (2014). U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?. (Thesis). Johns Hopkins University. Retrieved from http://jhir.library.jhu.edu/handle/1774.2/38065

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hale, Donald M. “U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?.” 2014. Thesis, Johns Hopkins University. Accessed August 03, 2020. http://jhir.library.jhu.edu/handle/1774.2/38065.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hale, Donald M. “U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?.” 2014. Web. 03 Aug 2020.

Vancouver:

Hale DM. U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?. [Internet] [Thesis]. Johns Hopkins University; 2014. [cited 2020 Aug 03]. Available from: http://jhir.library.jhu.edu/handle/1774.2/38065.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hale DM. U.S. Nuclear Triad: Is It Sustaining the Cold War or 21st Century Framework?. [Thesis]. Johns Hopkins University; 2014. Available from: http://jhir.library.jhu.edu/handle/1774.2/38065

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

27. Pakalniškis, S. What factors explain why there is not a common and comprehensive global response to cyber threats?.

Degree: 2012, Leiden University

Analysis of the main causes why there is not a comprehensive global response to cyber threats. Analysis focuses on state interactions in the UN and CoE. Advisors/Committee Members: Chalmers, Dr. A.W (advisor), Hosli, Prof.dr. M.O (advisor).

Subjects/Keywords: cyber security; cyber threats; united nations; council of europe; cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pakalniškis, S. (2012). What factors explain why there is not a common and comprehensive global response to cyber threats?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/19509

Chicago Manual of Style (16th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Masters Thesis, Leiden University. Accessed August 03, 2020. http://hdl.handle.net/1887/19509.

MLA Handbook (7th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Web. 03 Aug 2020.

Vancouver:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Internet] [Masters thesis]. Leiden University; 2012. [cited 2020 Aug 03]. Available from: http://hdl.handle.net/1887/19509.

Council of Science Editors:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Masters Thesis]. Leiden University; 2012. Available from: http://hdl.handle.net/1887/19509


University of Nairobi

28. Mulwa, Diminic K. A survey of insider information security threats management in commercial Banks in Kenya .

Degree: 2012, University of Nairobi

 The technological advances in information security have done a lot to contain and even prevent most of the remote or physical threats to information security.… (more)

Subjects/Keywords: survey; insider information security; threats; management; commercial banks; kenya

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulwa, D. K. (2012). A survey of insider information security threats management in commercial Banks in Kenya . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/14568

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulwa, Diminic K. “A survey of insider information security threats management in commercial Banks in Kenya .” 2012. Thesis, University of Nairobi. Accessed August 03, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/14568.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulwa, Diminic K. “A survey of insider information security threats management in commercial Banks in Kenya .” 2012. Web. 03 Aug 2020.

Vancouver:

Mulwa DK. A survey of insider information security threats management in commercial Banks in Kenya . [Internet] [Thesis]. University of Nairobi; 2012. [cited 2020 Aug 03]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/14568.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulwa DK. A survey of insider information security threats management in commercial Banks in Kenya . [Thesis]. University of Nairobi; 2012. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/14568

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Hu, Ruei-shian. Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company.

Degree: Master, Information Management, 2008, NSYSU

 The information security incidents have most often been reported. The loss of enterprise operation is more and more serious because of information security incidents. There… (more)

Subjects/Keywords: Assets Threats; Assets Vulnerability; Assets Evaluation; Risk Assessment; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, R. (2008). Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hu, Ruei-shian. “Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company.” 2008. Thesis, NSYSU. Accessed August 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hu, Ruei-shian. “Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company.” 2008. Web. 03 Aug 2020.

Vancouver:

Hu R. Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company. [Internet] [Thesis]. NSYSU; 2008. [cited 2020 Aug 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hu R. Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vytautas Magnus University

30. Gajauskas, Jonas. Minkštojo saugumo grėsmės Baltijos regione: Lietuvos atvejis.

Degree: Master, Political Sciences, 2010, Vytautas Magnus University

Pаstаruoju metu dаžnаi аkcentuojаmа, kаd keičiаsi vаlstybių sаugumo pobūdis ir grėsmių specifikа – dаžnаi ir išsаmiаi kаlbаmа аpie trаdicinių, kаrinių grėsmių reikšmės sumаžėjimą ir nаujo… (more)

Subjects/Keywords: Saugumas; Lietuva; Grėsmės; Baltijos regionas; Security; Lithuania; Threats; Baltic region

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gajauskas, Jonas. (2010). Minkštojo saugumo grėsmės Baltijos regione: Lietuvos atvejis. (Masters Thesis). Vytautas Magnus University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_100932-99288 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Gajauskas, Jonas. “Minkštojo saugumo grėsmės Baltijos regione: Lietuvos atvejis.” 2010. Masters Thesis, Vytautas Magnus University. Accessed August 03, 2020. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_100932-99288 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Gajauskas, Jonas. “Minkštojo saugumo grėsmės Baltijos regione: Lietuvos atvejis.” 2010. Web. 03 Aug 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Gajauskas, Jonas. Minkštojo saugumo grėsmės Baltijos regione: Lietuvos atvejis. [Internet] [Masters thesis]. Vytautas Magnus University; 2010. [cited 2020 Aug 03]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_100932-99288 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Gajauskas, Jonas. Minkštojo saugumo grėsmės Baltijos regione: Lietuvos atvejis. [Masters Thesis]. Vytautas Magnus University; 2010. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_100932-99288 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

[1] [2] [3] [4] [5] … [2811]

.