Listing 1 - 10 of 1489 << page
of 149
>>
Sort by

Digital
Patterns of Conventional Warfighting under the Nuclear Umbrella
Author:
ISBN: 9783030455941 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Palgrave Pivot

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explores how nuclear weapons influence conventional warfighting, through three case studies of countries not party to the Non-Proliferation Treaty - Pakistan, India, and Israel. The author examines how decision makers choose a preferred pattern of war management, as well as how these choices affect conflicts, suggesting that nuclear weaponization constitutes a clear change in the relative power of countries. This distribution of power within the international system expands or reduces the selection of strategies or war management patterns available to members of the international community. However, historic traumatic events like military defeats, countries’ self-images, and images of enemies form the perceptions of decision makers regarding material power and change thereof, suggesting that choices of decision makers are not affected directly by changes in relative power relations, but rather through an intermediate level of strategic culture parameter. Igor Davidzon is a Postdoctoral Research Fellow in the Center for Transnational Relations, Foreign and Security Policy at Freie Universität Berlin, Germany.

Keywords

Law --- veiligheid (mensen)


Periodical
Clinical risk
ISSN: 13562622 Publisher: Edinburgh

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Bioterrorism watch
ISSN: 15430243 Publisher: Suite, Ga

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Patiëntveiligheid : handboek voor medisch specialistische zorg
Authors: --- ---
ISBN: 9789058983060 Year: 2016 Publisher: Utrecht De Tijdstroom

Loading...
Export citation

Choose an application

Bookmark

Abstract

Stap voor stap bouwen aan patiënt­vei­lig­heid is een reis die nooit eindigt. Iedereen die met medisch specialistische zorg te ma­ken heeft, draagt daaraan op zijn eigen, unieke wijze bij: medisch specialisten, verpleegkundigen, leidinggevenden, stafmedewerkers, bestuurders en toezichthouders. Iedereen is immers specialist op het eigen terrein, en samen zorgen zij voor een omgeving waar de patiënt kan rekenen op de juiste zorg op het juiste moment door de juiste zorgverlener.De afgelopen 10 jaar zijn forse vorderingen geboekt bij het verbeteren van patiënt­veiligheid. Dat komt in dit boek aan de orde. Tegelijkertijd zijn verdere stappen nodig en mogelijk. Hoe zorgen we ervoor dat veiligheid intrinsiek is ingebouwd in het ontwerp en de uitvoering van onze zorg? Hoe kan veiligheid gekoppeld worden aan professioneel handelen, zonder overmatig uit te gaan van controle achteraf? Don Berwick schreef 'improving patient safety is not for the faint hearted'. Het vergt een open cultuur binnen complexe professionele organisaties, om te kunnen zien en benoemen hoe het beter kan. Aan die cultuur wil dit boek een bijdrage leveren. Onze patiënten mogen verwachten dat we die handschoen opnemen.


Digital
Managing New Security Threats in the Caribbean
Authors: --- ---
ISBN: 9783030987336 9783030987329 9783030987343 9783030987350 Year: 2022 Publisher: Cham Springer International Publishing, Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. With a wide-ranging look into some of the 'new' security threats facing state and non-state actors today, this book is designed to specifically offer new angles on tackling these threats in the Caribbean region. It explores issues relating to viruses, war and conflict, migration, geopolitics, climate change and terrorism through multi- and interdisciplinary perspectives on global (in-)securities. Each chapter clearly elucidates the connectedness of these non-traditional threats, drawing on a remarkable number of the most recent reports and scholarly works. Most importantly, there is a lack of Caribbean studies in the security themes that are studied. This book is a much needed and timely addition to intellectual thought on Caribbean security in an increasingly fragmented world. It will be of great interest to students of international security studies, human security, global politics, and international relations. Georgina Chami is Lecturer, Institute of International Relations, University of the West Indies, St. Augustine, Trinidad and recipient of the Central America/Caribbean Fulbright Visiting Scholars Program in 2010 Jerome Teelucksingh is Senior Lecturer, in the Faculty of Humanities and Education at The University of the West Indies, St. Augustine Campus, Trinidad. Marlon Anatol is Lecturer at the Open Campus, University of the West Indies, Trinidad.


Book
The effect of the vehicle dynamics on the light distribution of headlamps
Author:
ISBN: 3896758144 Year: 2001 Publisher: München Herbert Utz Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Terrorism, Radicalisation & Countering Violent Extremism : Practical Considerations & Concerns
Author:
ISBN: 9789811319990 Year: 2019 Publisher: Singapore Springer Singapore :Imprint: Palgrave Pivot

Loading...
Export citation

Choose an application

Bookmark

Abstract

“This is an important and timely publication, bridging the gap between academia and practitioners to provide the latter with insights based on rigorous evidence-led research.” — Dr Shiraz Maher, Director of the International Centre for the Study of Radicalisation, King’s College London This book brings together research that covers perspectives and case studies on terrorism, radicalisation and countering violent extremism (CVE). Written by experts involved in these issues at the grassroots, the book bridges the academic-practitioner gap in the field. The proliferation of academic studies and conferences devoted to these subjects has meant that policymakers and practitioners in the same fields sometimes struggle to digest the sheer volume of academic output. The same critical questions keep coming up, but it is debatable the level to which there have been tangible improvements to our real state of knowledge: knowledge in especially in terms of what “best practices” exist in the field (and what can be translated, versus what approaches remain context- and location-specific). Written in an accessible manner for the general interested reader, practitioners, and policymakers in the field, this volume comprises edited versions of papers presented at CVE workshops run by the Centre of Excellence for National Security (CENS) at the S.Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore, in 2016 and 2017. Shashi Jayakumar was educated at Oxford University where he studied History (BA 1997, D.Phil, 2001). He was a member of the Singapore government Administrative Service from 2002-2017. During this time, he was posted to various Ministries, including the Ministry of Defence. He has been the Head of CENS since 2015.


Digital
Cybersecurity Incident Response : How to Contain, Eradicate, and Recover from Incidents
Author:
ISBN: 9781484238707 Year: 2018 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You’ll Learn: Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team.


Digital
Digital Forensics Basics : A Practical Guide Using Windows OS
Author:
ISBN: 9781484238387 Year: 2019 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.


Digital
Professional Red Teaming : Conducting Successful Cybersecurity Engagements
Author:
ISBN: 9781484243091 Year: 2019 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You’ll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.

Listing 1 - 10 of 1489 << page
of 149
>>
Sort by