UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.073.773
21.
  • Greenland in Arctic Security Greenland in Arctic Security
    2024, 2024.
    eBook
    Odprti dostop

    Greenland has increasingly captivated imaginations around the globe. Yet, while it is central to the Arctic region, its role has been poorly understood. Greenland in Arctic Security delivers a ...
Celotno besedilo
22.
Celotno besedilo
23.
  • Security Requirements and C... Security Requirements and Challenges of 6G Technologies and Applications
    Abdel Hakeem, Shimaa A; Hussein, Hanan H; Kim, HyungWon Sensors (Basel, Switzerland), 03/2022, Letnik: 22, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a ...
Celotno besedilo

PDF
24.
  • Hands on Hacking Hands on Hacking
    Matthew Hickey, Hickey; Jennifer Arcuri, Arcuri 08/2020
    eBook

    A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world ...
Celotno besedilo
25.
  • Troubled Waters Troubled Waters
    Kamrava, Mehran 05/2018
    eBook

    Troubled Waterslooks at four dynamics in the Persian Gulf that have contributed to making the region one of the most volatile and tension-filled spots in the world. Mehran Kamrava identifies the four ...
Celotno besedilo
26.
  • From information security t... From information security to cyber security
    von Solms, Rossouw; van Niekerk, Johan Computers & security, 10/2013, Letnik: 38
    Journal Article
    Recenzirano

    The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information ...
Celotno besedilo
27.
  • Everyday security threats Everyday security threats
    Stevens, Daniel 2016, 20161120, 2016-11-20
    eBook

    Everyday security threats explores public perceptions of security threats in contemporary Britain, using data from extensive fieldwork and drawing on perspectives from International Relations, ...
Celotno besedilo
28.
  • States, Citizens and the Pr... States, Citizens and the Privatisation of Security
    Krahmann, Elke 02/2010
    eBook

    Recent years have seen a growing role for private military contractors in national and international security. To understand the reasons for this, Elke Krahmann examines changing models of the state, ...
Celotno besedilo
29.
  • Art of War in an Age of Pea... Art of War in an Age of Peace: U.S. Grand Strategy and Resolute Restraint
    Michael O'Hanlon, O'Hanlon 05/2021
    eBook

    An informed modern plan for post-2020 American foreign policy that avoids the opposing dangers of retrenchment and overextension Russia and China are both believed to have "grand strategies"-detailed ...
Celotno besedilo
30.
  • Twilight policing Twilight policing
    Diphoorn, Tessa G 2015., 20151020, 2015, 2015-10-20
    eBook

    South Africa boasts the largest private security sector in the entire world, reflecting deep anxieties about violence, security, and governance.Twilight Policingis an ethnographic study of the daily ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.073.773

Nalaganje filtrov