Julie Hesmondhalgh : a working diary / Julie Hesmondhalgh. [electronic resource]
By: Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781350025707 (e-book)
- 792.7028092 23
- PN2598.V44 .H476 2019
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Ebook | TUS: Midlands, Main Library Athlone Online | eBook (Browse shelf(Opens below)) | Available |
Description based on print version record.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
-
1
Scientific support for the decision making in the security sector
-
2
A process for developing a common vocabulary in the information security area
-
3
Computational models of risks to infrastructure
-
4
Establishing security and stability in the wider Black Sea area
-
5
Quantum communication and security
-
6
Hypermedia seduction for terrorist recruiting
-
7
Understanding and responding to terrorism
-
8
Tuning priorities in nuclear arms control and non-proliferation
-
9
Security sector transformation in Southeastern Europe and the Middle East
-
10
Strengthening religious tolerance for a secure civil society in Albania and the Southern Balkans
-
11
Suicide as a weapon
-
12
Nuclear security culture
-
13
Responses to cyber terrorism
-
14
Social and psychological effects of radiological terrorism
-
15
Amputee sports for victims of terrorism
-
16
The fight against terrorism and crisis management in the Western Balkans
-
17
Complexity and security
-
18
Legal aspects of combating terrorism
-
19
Lowering suicide risk in returning troops
-
20
Boolean functions in cryptology and information security
-
21
Aspects of network and information security
-
22
Suicide bombers
-
23
Social dynamics of global terrorism and prevention policies
-
24
Organizational and psychological aspects of terrorism
-
25
Nuclear doctrines and strategies
-
26
Higher-dimensional geometry over finite fields
-
27
Political violence, organized crimes, terrorism, and youth
-
28
Building and using datasets on armed conflicts
-
29
Risk assessment as a basis for the forecast and prevention of catastrophies
-
30
Commercial and pre-commercial cell detection technologies for defence against bioterror
-
31
Advanced technologies and methodologies for risk management in the global transport of dangerous goods
-
32
Mining massive data sets for security
-
33
Lessons to be learned from non-proliferation failures and successes
-
34
Identity, security and democracy
-
35
Language engineering for lesser-studied languages
-
36
Secure telematic applications for national scale projects
-
37
Constructal human dynamics security and sustainability
-
38
Engineering methods and tools for software safety and security
-
39
Transportation security against terrorism
-
40
Defense against weapons of mass destruction terrorism
-
41
Algebraic aspects of digital communications
-
42
Building terrorism resistant communities
-
43
Activating psychosocial local resources in territories affected by war and terrorism
-
44
Modelling cyber security
-
45
Assessing the threat of weapons of mass destruction
-
46
NATO at 60
-
47
Building safer communities
-
48
Home-grown terrorism
-
49
Pandemics and bioterrorism
-
50
Quantum cryptography and computing