نتایج جستجو برای: international security
تعداد نتایج: 477067 فیلتر نتایج به سال:
since a long time ago, the persian gulf security has always formed the focus of attention of regional states and the world big powers. during the final years of the 20th and early 21st centuries given the changes and transformations occurring after the us war and iraq invasion, the significance of the region from security perspective increased. as a result, several conventions and special dialo...
in the mid-1950s, regionalism rose in international literature. in the middle east and persian gulf regional issues draw attention of theorists in the late 1960s. at first, regionalism aimed to organize political will of regional leaders towards to organize political will, while regionalism in the middle east and persian gulf concentrated on the security affairs. this proves that the essence of...
BACKGROUND Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. METHODS Using cas...
at current study, the relationship between transnational law, globalization and international solidarity has been studied, and talcott parsons's structural functionalism approach has been used as theoretical framework. this study is based on the assumption that: any inconsistency between the legal system and other social systems can result in social anomie. in the next part of the paper, t...
With the rise of security breaches and the running of technology at its highest gear on the information superhighway, protection of confidential and vital information never has been more crucial. This paper provides an overview of an international effort called Common Criteria (CC), an IT Security evaluation methodology, developed to define and facilitate consistent evaluations of security prod...
With the rise of security breaches and the running of technology at its highest gear on the information superhighway, protection of confidential and vital information never has been more crucial. This paper provides an overview of an international effort called Common Criteria (CC), an IT Security evaluation methodology, developed to define and facilitate consistent evaluations of security prod...
Preparing the books to read every day is enjoyable for many people. However, there are still many people who also don't like reading. This is a problem. But, when you can support others to start reading, it will be better. One of the books that can be recommended for new readers is data and applications security developments and directions ifip tc11 wg11 3 fourteenth annual working conference o...
ISBN 555555555/$10.00 2004 IEEE Abstract – Malicious worms have presented a formidable threat to the security community in recent years. Beginners to internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This worm is also useful to researchers needing see how a typical worm w...
Dr. James E. Doyle is a technical staff member in the Nonproliferation and International Security Division at Los Alamos National Laboratory. His professional focus is on systems analysis, strategic planning, and policy development. Dr. Doyle holds a Ph.D in International Security Studies from the University of Virginia. Previously, Dr. Doyle was a senior policy analyst at Science Applications ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید