• Nenhum resultado encontrado

[PDF] Top 20 National security. A new approach to maritime terrorism in Africa

Has 10000 "National security. A new approach to maritime terrorism in Africa" found on our website. Below are the top 20 most common "National security. A new approach to maritime terrorism in Africa".

National security. A new approach to maritime terrorism in Africa

National security. A new approach to maritime terrorism in Africa

... the new threats, within the framework of the International Security Studies, do not fit the conventional parameters of "who" threatens, "how," "when," and "where," the ... See full document

14

India and Africa: maritime security and India’s strategic interests in the Western Indian Ocean

India and Africa: maritime security and India’s strategic interests in the Western Indian Ocean

... critical to securing its strategic inter- ests. India’s interests in the Indian Ocean region are heavily focused towards im- proving trade, investment and economic growth, while it also attempts to ... See full document

37

The impact of cybersecurity on the regulatory legal framework for maritime security

The impact of cybersecurity on the regulatory legal framework for maritime security

... seen in an up and down approach. Thus, we are getting closer to the evolution of NATO's traditional “naval defence” mission towards a broad notion of “maritime security”, whereby it is ... See full document

22

The Inter-American Security System: Changes and Challenges

The Inter-American Security System: Changes and Challenges

... on Security is that the “multidimensional” approach is much broader than the concept of security commonly referred to in interna- tional relations (Radseck, 2005, ...ditional ... See full document

17

China	and	India’s	Maritime Geostrategies: Implications	for	International Maritime	Security	and	Scenarios for	2030

China and India’s Maritime Geostrategies: Implications for International Maritime Security and Scenarios for 2030

... Realist approach to Security is too narrow‐minded, with the brunt of the focus placed on military threats to national security rather than non‐military threats, such as economic, ... See full document

125

Pattern Recognition Approach in Multidimensional Databases: Application to the Global Terrorism Database

Pattern Recognition Approach in Multidimensional Databases: Application to the Global Terrorism Database

... Global Terrorism Database (GTD) [19, 20, 21] is a vast collection of terrorist activities reported around the globe that incorporates more than ...the National Consortium for the Study of Terrorism ... See full document

7

A new approach to estimating Mean Flow in the UK

A new approach to estimating Mean Flow in the UK

... available to satisfy demands made by the plant/soil ...rate to a constant actual evaporation rate once a critical ‘root reservoir’, equivalent to SMD, had been ...depleted. In this model, the ... See full document

12

A genetic approach to the relationship between taste perception and lifestyle in Africa.

A genetic approach to the relationship between taste perception and lifestyle in Africa.

... thought to have been a main factor determining the current worldwide patterns of human genetic ...associated to many dietary shifts, among which one of the most important happened around 10 000 YBP, when ... See full document

131

An operational approach to high resolution agro-ecological zoning in West-Africa

An operational approach to high resolution agro-ecological zoning in West-Africa

... used to support agricultural planning based on sea- sonal climate forecasts from AGRHYMET ...example to represent a typical dry year as done in this study (see ...crops in its data ... See full document

16

THE ROLE OF MICROFINANCE IN RIGHT-BASED APPROACH TO FOOD IN AFRICA

THE ROLE OF MICROFINANCE IN RIGHT-BASED APPROACH TO FOOD IN AFRICA

... right to food can also be established from a justice ...1999), in his book on Theory of Justice outlines two principle of ...interest in this ...need to be rearranged so that the ... See full document

11

Brazil versus NATO? A long-term view of maritime security in the Atlantic

Brazil versus NATO? A long-term view of maritime security in the Atlantic

... As the Summit Press Release underscored: The Study on NATO Enlargement further outlined that NATO enlargement will contribute to enhanced stability and security for all countries in the [r] ... See full document

292

A new approach to assess the ecotourism potential in protected areas: The case study of Peneda-Gerês National Park

A new approach to assess the ecotourism potential in protected areas: The case study of Peneda-Gerês National Park

... way to assess the ecotourism potential of hiking trails. This approach might help to manage recreational activities in protected ...basis to explore their activities throughout all the ... See full document

11

NTELLIGENT INFORMATION SYSTEMS. AN IMPORTANT AID TO NATIONAL SECURITY

NTELLIGENT INFORMATION SYSTEMS. AN IMPORTANT AID TO NATIONAL SECURITY

... out in order to produce a particular result or to meet the needs of specifi c customer oriented ...globalization. In a modern organization, information technology is leading to ... See full document

4

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

... prompt in areas like e-commerce sites, financial institutions, payment processes and other online ...system security and privacy became the central issues for the acceptance of online payment methods ... See full document

5

Global S&AD Approach for New Information Systems Architectures Security

Global S&AD Approach for New Information Systems Architectures Security

... contributing to ensure a normal continuity for the ...used to design the system and to produce it under the form of ...due to their ...expressed in the design schema, developer for ... See full document

6

J. Aerosp. Technol. Manag.  vol.7 número4

J. Aerosp. Technol. Manag. vol.7 número4

... noted in the last two years that, even though piracy is decreasing as a phenomenon in the Indian Ocean, it is being increased in other areas like West Africa with recent incidents up to ... See full document

14

The Art of Security, Human Security and Why China Needs It

The Art of Security, Human Security and Why China Needs It

... seek to address the personal and financial dependency of EPBs towards local governments and must be complemented with policies that enhance Political Security, namely the authority of local courts and their ... See full document

136

Web security analysis : an approach to HTML5 risks and pitfalls

Web security analysis : an approach to HTML5 risks and pitfalls

... been in constant changing in the last decade, and have evolved to became more efficient and more ...capable. In [Lopes et ...”difficult to use, tedious, and limited in their ... See full document

94

THE EU APPROACH TO THE WESTERN BALKANS: A SECURITY OR POLITICAL ISSUE?

THE EU APPROACH TO THE WESTERN BALKANS: A SECURITY OR POLITICAL ISSUE?

... Service in cooperation with some NGOs in the ...response to visa facilitation in the region; people did not perceive the difference to the situation" (European Citizens Action ... See full document

17

A new approach to assess defragmentation strategies in dynamically reconfigurable FPGAs

A new approach to assess defragmentation strategies in dynamically reconfigurable FPGAs

... due to an increase in the length of interconnection lines, whose im- pact is minor, but mainly because each line has to cross a greater number of Programmable Interconnect Points ...have to ... See full document

7

Show all 10000 documents...