|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn939404913 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
160215t20162016sz ab ob 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d GW5XE
|d YDXCP
|d IDEBK
|d AZU
|d OCLCF
|d CDX
|d EBLCP
|d COO
|d OHI
|d UAB
|d IAD
|d JBG
|d ICW
|d ILO
|d ICN
|d OCLCQ
|d ESU
|d IOG
|d U3W
|d REB
|d OCLCQ
|d EZ9
|d OCLCQ
|d WYU
|d UPM
|d VT2
|d S3O
|d UKMGB
|d AU@
|d UKAHL
|d OCLCQ
|d AUD
|d LEAUB
|d DCT
|d ERF
|d OCLCQ
|d SFB
|d LQU
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|
015 |
|
|
|a GBB8O2666
|2 bnb
|
016 |
7 |
|
|a 019179879
|2 Uk
|
019 |
|
|
|a 940438472
|a 948683905
|a 1086469874
|a 1110850527
|a 1112542925
|a 1137209459
|a 1156031380
|
020 |
|
|
|a 9783319279145
|q (electronic bk.)
|
020 |
|
|
|a 3319279149
|q (electronic bk.)
|
020 |
|
|
|z 9783319279138
|q (print)
|
020 |
|
|
|z 3319279130
|q (print)
|
024 |
7 |
|
|a 10.1007/978-3-319-27914-5
|2 doi
|
024 |
8 |
|
|a 10.1007/978-3-319-27
|
029 |
1 |
|
|a AU@
|b 000057214829
|
029 |
1 |
|
|a UKMGB
|b 019179879
|
035 |
|
|
|a (OCoLC)939404913
|z (OCoLC)940438472
|z (OCoLC)948683905
|z (OCoLC)1086469874
|z (OCoLC)1110850527
|z (OCoLC)1112542925
|z (OCoLC)1137209459
|z (OCoLC)1156031380
|
037 |
|
|
|a com.springer.onix.9783319279145
|b Springer Nature
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
072 |
|
7 |
|a TNKS
|2 bicssc
|
082 |
0 |
4 |
|a 658.4/7
|a 005.7
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Exploring the security landscape :
|b non-traditional security challenges /
|c Anthony J. Masys, editor.
|
264 |
|
1 |
|a Switzerland :
|b Springer,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource :
|b color illustrations, color maps
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
1 |
|
|a Advanced sciences and technologies for security applications
|
588 |
0 |
|
|a Online resource; title from PDF title page (Ebsco, viewed February 16, 2016).
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross Country Comparison -- National Security in a Hyper-Connected World -- Is Maritime Security a Traditional Security Challenge -- Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- An evaluation of the Police Response to Gang-related Violence and Future Security Threat -- The Demographic horizon of the emerging security environment -- Economic Security: An emerging security issue -- Critical Infrastructure vulnerabilities: embracing a network mindset.-Supply Chain Information Security: emerging challenges in the telecommunications industry.-Disrupting terrorist and criminal networks: Crime script analysis through DODAF applications -- Beyond the Castle Model of Cyber-risk and cyber-security -- Food Security as Critical Infrastructure: the importance of safeguarding the food supply for civil security -- The role of Social Network Sites in security risks and crises: The information warfare of terrorism -- Manufactured Risk, complexity and non-traditional security: from world risk society to a networked risk model.
|
520 |
|
|
|a This book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been described as transnational in nature and incorporates natural disasters, gang violence, extremism and terrorism, amongst other issues. Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security. Relevant theoretical frameworks are presented and readers are expertly guided through complex threats, from matters pertaining to health security which pose threats not only to humans but also have significant national security implications, to issues regarding critical infrastructure vulnerability and the complexity of understanding terrorist operations. Authors reveal how emerging uncertainties regarding global critical infrastructure and supply chain security, food security, and health security are linked to the notion of human security. Security professionals, policy makers and academics will all gain from the insights, strategies and perspectives in this book. It builds understanding of the deepening and broadening domain of security studies and provides a valuable reference text for courses on security studies and international relations.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Human security.
|
650 |
|
0 |
|a Globalization.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité humaine.
|
650 |
|
6 |
|a Mondialisation.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
7 |
|a globalism.
|2 aat
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a Mathematical physics.
|2 bicssc
|
650 |
|
7 |
|a Public health & preventive medicine.
|2 bicssc
|
650 |
|
7 |
|a Energy technology & engineering.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Natural disasters.
|2 bicssc
|
650 |
|
7 |
|a Security & fire alarm systems.
|2 bicssc
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Globalization
|2 fast
|
650 |
|
7 |
|a Human security
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
700 |
1 |
|
|a Masys, Anthony,
|e author,
|e editor.
|
758 |
|
|
|i has work:
|a Exploring the security landscape (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGrwCh8M67BFCB4D8RKvtq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Exploring the Security Landscape: Non-Traditional Security Challenges.
|d Cham : Springer International Publishing, ©2016
|z 9783319279138
|
830 |
|
0 |
|a Advanced sciences and technologies for security applications.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4405866
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH31357556
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 33917459
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4405866
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1170194
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis33917459
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12848493
|
994 |
|
|
|a 92
|b IZTAP
|