Search Results: 'threat'

Search

×
×
×
×
3,863 results for "threat"
Microsoft Predicts Top Cyber Threats for 2014 By Patsy Kendra
eBook (PDF): $9.04
There's very little to argue with here, but other than the World Cup, Microsoft's top security predictions for 2014 could easily be a list for 2013 or even 2015. Usually lists like Microsoft's 2014... More > top security predictions make me painfully aware of how little progress the security industry makes as time rolls on, said security expert Ken Pickering.< Less
The Protection Specialist's Guide To Stalking & Harassment Threat Management By
Paperback: $37.78
Prints in 3-5 business days
(1 Ratings)
This book provides a working standard and a set of guidelines to professionals working in the field of close personal protection or private investigation and who deal with clients who are victims of... More > stalking and harassment. This book also provides the victims themselves, with a set of useful guidelines to assist in removing the threat of harm from a stalker or other violent offender.< Less
The Protection Specialist's Guide To Stalking & Harassment Threat Management By
eBook (PDF): $25.00
(1 Ratings)
This book provides a working standard and a set of guidelines to professionals working in the field of close personal protection or private investigation and who deal with clients who are victims of... More > stalking and harassment. This book also provides the victims themselves, with a set of useful guidelines to assist in removing the threat of harm from a stalker or other violent offender.< Less
The Protection Specialist's Guide to Stalking & Harassment Threat Management By Miguel A R Denyer
eBook (ePub): $25.99
This book provides a working standard and a set of guidelines to professionals working in the field of close personal protection or private investigation and who deal with clients who are victims of... More > stalking and harassment. This book also provides the victims themselves, with a set of useful guidelines to assist in removing the threat of harm from a stalker or other violent offender.< Less
The Rise in Prediabetes: The Threat of Insulin Resistance and Hyperglycemia By Simon Marlow
eBook (ePub): $6.97
The Rise in Prediabetes: The Threat of Insulin Resistance and Hyperglycemia Three Steps to Stop the Threat of Type 2 Diabetes The focus of this book is a condition called prediabetes resulting in... More > insulin resistance and hyperglycemia. This state, though not as yet a disease, is an indicator of things to come that you want to avoid, namely Type 2 Diabetes. Combining the three steps, or pillars, of diet, exercise and monitoring, will allow you to better understand your body and how it reacts to certain foods, drinks and exercise. Despite what you hear about the need for diet and exercise, a one-size-fits-all approach does not work. You need to tailor your diet and exercise to fit your needs, not someone else’s perceived view of what you should eat and how you should exercise. If you can catch elevated blood glucose in this state it is relatively simple to manage but it does require taking the warning seriously and some adjustments to your lifestyle, though not drastic changes.< Less
STOPPING the Nuclear threat in Europe and South Asia By David Heilbron Price
Paperback: List Price: $4.21 $3.79 | You Save: 10%
Prints in 3-5 business days
After World War Two, European States expected further wars. Many States including Switzerland, France, Germany, wanted to create their own A-bombs. War did not happen. Instead Europe entered the... More > longest period of peace in more than 2000 years. Thanks to the diplomacy of Robert Schuman, creator of the European Community, European States created an Atomic Energy Community which controlled the use of fissile material for bombs. Today among worldwide crises and threats of nuclear war, Europe needs to complete the obligations in the Euratom Treaty of 1957. How should democrats deal with the Indian bomb, the Pakistani bomb and the Iranian bomb? This short book shows how to apply the blueprint of the successful European experiment elsewhere. 'It is possible for the world to cure itself from the threat of nuclear war,' says author, David H Price, Schuman historian, journalist and former Euratom official. 'Not only that, it is possible for the world to enter a time of great prosperity.'< Less
Volume 5577, Potential threats to humanity --- Potting and stamping By Print Wikipedia
Hardcover: $80.00
Prints in 3-5 business days
Volume 5577, Potential threats to humanity---Potting and stamping Print Wikipedia is a both a utilitarian visualization of the largest accumulation of human knowledge and a poetic gesture towards... More > the inhuman scale of big data. Michael Mandberg wrote software that parses the entirety of the English-language Wikipedia database and programmatically lays out nearly 7500 volumes, complete with covers, and then uploads them to Lulu.com for print-on-demand. Print Wikipedia draws attention to the sheer size of the encyclopedia's content and the impossibility of rendering Wikipedia as a material object in fixed form: Once a volume is printed it is already out of date. It is also a work of found poetry built on what is likely the largest appropriation ever made. As we become increasingly more dependent on information and source material on the Internet today, Mandiberg explores the accessibility of its vastness.< Less
Isolation in Public Clouds: Threats, Challenges, and Defenses By Venkatanathan Varadarajan
Hardcover: $59.94
Prints in 3-5 business days
Many applications that are in day-to-day use by customers over the Internet are hosted in the public clouds. Public clouds such as Amazon EC2, Google Compute Engine and Microsoft Azure allow clients... More > to run virtual machines (VMs) on shared physical infrastructure. This practice of multi-tenancy improves efficiency by multiplexing resources among disparate customers at low costs. Unfortunately, it also introduces the risk of sharing a physical server to run both sensitive customer applications and VMs that may belong to an arbitrary and potentially malicious users. In this book, we focus on one of the main security threats uniquely arises in public clouds, cross-VM attacks, and evaluate how the cloud infrastructure fares against these attacks.< Less
Alternative Governance Structures in Megacities: Threats or Opportunities? By Diane E. Chido
Paperback: $15.97
Prints in 3-5 business days
Many cities are growing into “mega” land areas filled with complex terrain and populations where the U.S. military will undoubtedly have to engage. Often, states fail to provide basic... More > services to some territories, leaving inhabitants disenfranchised. These gaps are then filled by social entrepreneurs, often ethnic or religious-based civil society groups—or even organized crime syndicates—who effectively identify niche needs in the marketplace and fill them more effectively than other competitors, including traditional state authorities. Leaders of these groups maintain control through various means, including: violence, coercion, and service provision; or through tribal, religious, or other cultural ties and structures. In order to understand and predict the emergence of alternative governance, and to identify whether it represents a threat or opportunity to U.S. interests, we must develop a toolkit, which can be based on existing sources and analytic methods that only need to be expanded.< Less
Chinese Perceptions Of Traditional And Nontraditional Security Threats By Strategic Studies Institute & Susan L. Craig
Paperback: $19.97
Prints in 3-5 business days
While “knowing your enemy” has long been a Chinese stratagem, cultural intelligence only recently has gained precedence in American military strategy. Our efforts in Iraq, Afghanistan,... More > and the war on terror remind us of how differently much of the rest of the world thinks and perceives. This monograph is an effort to better understand Chinese thinking. Ms. Susan Craig’s research into Chinese threat perceptions is important for several reasons. Above all, it provides valuable insight into the comprehensiveness of the Chinese concept of national security and how China perceives itself, the world, and China’s place within it. Further, the author’s deliberate effort to maintain a Chinese perspective by relying solely on Chinese sources—namely, scholarly journals, the news media, official policy pronouncements, and personal interviews—demonstrates that Chinese intentions and motivations are not a secret.< Less

Top 10

see more >
 
 
 
 
 
 
 
 
 
 
 
 
 
9