NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 8,896,170
1.
  • The Evolution of Internatio... The Evolution of International Security Studies
    Buzan, Barry; Hansen, Lene 08/2009
    eBook

    International Security Studies (ISS) has changed and diversified in many ways since 1945. This book provides the first intellectual history of the development of the subject in that period. It ...
Full text
2.
  • Human Security and the UN Human Security and the UN
    MacFarlane, S. Neil; Khong, Yuen Foong 2006, 20060101
    eBook

    How did the individual human being become the focus of the contemporary discourse on security? What was the role of the United Nations in securing the individual? What are the payoffs and costs of ...
Full text
3.
  • Security integration in Europe Security integration in Europe
    Cross, Mai'a 2011., 20110830, 2011, c2011.
    eBook

    At a time when many observers question the EU's ability to achieve integration of any significance, and indeed Europeans themselves appear disillusioned, Mai'a K. Davis Cross argues that the EU has ...
Full text

PDF
4.
  • Nordic Societal Security : ... Nordic Societal Security : Convergence and Divergence (Edition 1)
    Larsson, Sebastian; Rhinard, Mark NordSTEVA, 07/2020
    eBook, Book
    Open access

    "This book compares and contrasts publicly espoused security concepts in the Nordic region, and explores the notion of societal security. Outside observers often assume that Nordic countries take ...
Full text

PDF
5.
Full text
6.
  • Security and Game Theory Security and Game Theory
    Tambe, Milind 12/2011
    eBook

    Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy ...
Full text
7.
  • Automatic Fingerprinting of... Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
    Zuo, Chaoshun; Wen, Haohuang; Lin, Zhiqiang ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/2019
    Conference Proceeding
    Open access

    Being an easy-to-deploy and cost-effective low power wireless solution, Bluetooth Low Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT scenario, an IoT device ...
Full text

PDF
8.
  • Routledge Handbook of Inter... Routledge Handbook of International Cybersecurity (Edition 1)
    Eneken Tikk; Mika Kerttunen Routledge eBooks, 01/2020
    eBook
    Open access

    The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. ...
Full text
9.
  • Smart Locks Smart Locks
    Ho, Grant; Leung, Derek; Mishra, Pratyush ... Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 05/2016
    Conference Proceeding

    We examine the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock ...
Full text
10.
  • Rational Cybersecurity for ... Rational Cybersecurity for Business
    Blum, Dan 2020, 2020-08-12T00:00:00, 2020-08-12, 2021.
    eBook
    Open access

    Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working ...
Full text
1 2 3 4 5
hits: 8,896,170

Load filters