Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Degree Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Granting Institution
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
13,676,564 result(s) for "Securities"
Sort by:
The Evolution of International Security Studies
International Security Studies (ISS) has changed and diversified in many ways since 1945. This book provides the first intellectual history of the development of the subject in that period. It explains how ISS evolved from an initial concern with the strategic consequences of superpower rivalry and nuclear weapons, to its current diversity in which environmental, economic, human and other securities sit alongside military security, and in which approaches ranging from traditional Realist analysis to Feminism and Post-colonialism are in play. It sets out the driving forces that shaped debates in ISS, shows what makes ISS a single conversation across its diversity, and gives an authoritative account of debates on all the main topics within ISS. This is an unparalleled survey of the literature and institutions of ISS that will be an invaluable guide for all students and scholars of ISS, whether traditionalist, 'new agenda' or critical.
Advanced infrastructure penetration testing
It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN. With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection. Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system. By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.
Everyday security threats
Everyday security threats explores public perceptions of security threats in contemporary Britain, using data from extensive fieldwork and drawing on perspectives from International Relations, security studies and political psychology.
Security Requirements and Challenges of 6G Technologies and Applications
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks’ trustworthiness and solutions.
Human security and the UN : a critical history
How did the individual human being become the focus of the contemporary discourse on security? What was the role of the United Nations in securing the individual? What are the payoffs and costs of this extension of the concept? Neil MacFarlane and Yuen Foong Khong tackle these questions by analyzing historical and contemporary debates about what is to be secured. From Westphalia through the 19th century, the state's claim to be the object of security was sustainable because it offered its subjects some measure of protection. The state's ability to provide security for its citizens came under heavy strain in the 20th century as a result of technological, strategic, and ideological innovations. By the end of World War II, efforts to reclaim the security rights of individuals gathered pace, as seen in the Universal Declaration of Human Rights and a host of United Nations covenants and conventions. MacFarlane and Khong highlight the UN's work in promoting human security ideas since the 1940s, giving special emphasis to its role in extending the notion of security to include development, economic, environmental, and other issues in the 1990s.