Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

18.017 results (0,27693 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Euro-Mediterranean Security A Search for Partnership

Euro-Mediterranean Security: A Search for Partnership A Search for Partnership

Network Security

Network Security

First Published in 2002. Network Security: a practical guide provides a comprehensive review of network security issues with relevance to corporate networks fromboth an administrative and user perspective. It is particularly suited to IS executives administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization. The book covers a broad range of issues starting with an assessment of network security including the financial implications of security breaches and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness including system configuration acceptable use business continuity and explaining technical solutions available such as firewalls and content control. Introduction of a security policy is widely accepted as best practise in informing and educating users and the final chapter is devoted to policy writing. By the end of the book readers should be ready to create and implement a network security policy for their organization and start reducing overheads and downtime immediately!*Discusses all the relevant issues with a concise straightforward and readily accessible approach. *Important emphasis placed on the people management aspects of network security. *Practical business oriented approach includes reference to legal and financial aspects of network security. *Companion web site at www. networksecurity. org. uk includes updates additional material downloads and links to resources and further information.

GBP 175.00
1

US National Security Reform Reassessing the National Security Act of 1947

Routledge Handbook of African Security

Understanding Mexico’s Security Conundrum

Routledge Handbook of Security Studies

Critical Security Studies An Introduction

Critical Security Studies An Introduction

This textbook introduces students to the sub-field of critical security studies through a detailed yet accessible survey of emerging theories and practices. This third edition contains two new chapters – on ‘Ontological security’ and ‘(In)Security and the everyday’ – and has been fully revised and updated. Written in an accessible and clear manner Critical Security Studies: offers a comprehensive and up-to-date introduction to critical security studies locates critical security studies within the broader context of social and political theory evaluates fundamental theoretical positions in critical security studies against a backdrop of new security challenges. The book is divided into two main parts. Part I ‘Approaches’ surveys the newly extended and contested theoretical terrain of critical security studies: constructivist theories Critical Theory feminist and gender approaches postcolonial perspectives poststructuralism and International Political Sociology Ontological security and securitisation theory. Part II ‘Issues’ examines how these various theoretical approaches have been put to work in critical considerations of environmental and planetary security; health human security and development; information technology and warfare; migration and border security; (in)security and the everyday; and terror risk and resilience. The historical and geographical scope of the book is deliberately broad and each of the chapters in Part II concretely illustrates one or more of the approaches discussed in Part I with clear internal referencing allowing the text to act as a holistic learning tool for students. This book is essential reading for upper level students of critical security studies and an important resource for students of international/global security political theory and international relations. | Critical Security Studies An Introduction

GBP 34.99
1

The Science of Biometrics Security Technology for Identity Verification

Japan s Search for Strategic Security Partnerships

Chinese-Japanese Competition and the East Asian Security Complex Vying for Influence

Chinese-Japanese Competition and the East Asian Security Complex Vying for Influence

This volume examines contemporary diplomatic economic and security competition between China and Japan in the Asia-Pacific region. The book outlines the role that Sino-Japanese competition plays in East Asian security an area of study largely overlooked in contemporary writing on Asian security which tends to focus on US–China relations and/or US hegemony in Asia. The volume focuses on Chinese and Japanese foreign policy under President Xi Jinping and Prime Minister Shinzō Abe and regional security dynamics within and between Asian states/institutions since 2012. It employs regional security complex theory as a theoretical framework to view Chinese and Japanese competition in the Asian region. In doing so the volume draws on a levels of analysis approach to demonstrate the value in looking at security in the Asia-Pacific from a regional rather than global perspective. The vast majority of existing research on the region’s security tends to focus on great power relations and treats Asia as a sub-region within the larger global security architecture. In contrast this volume shows how competition between the two largest Asian economies shapes East Asia’s security environment and drives security priorities across Asia’s sub-regions. As such this collection provides an important contribution to discussion on security in Asia; one with potential to influence both political and military policy makers security practitioners and scholars. This book will be of much interest to students of Asian politics regional security diplomacy and international relations. | Chinese-Japanese Competition and the East Asian Security Complex Vying for Influence

GBP 38.99
1

The Security Risk Handbook Assess Survey Audit

Homeland Security Scams

Homeland Security Scams

A direct consequence of the War on Terror launched after the attacks of September 11 2001 is an awareness of the need for homeland security. This war is being used to justify a huge expansion of government powers and spending but funds allocated for homeland security are often for programs far removed from anything that might be termed defense or security. In Homeland Security Scams James T. Bennett shows that this government spending is doing very little to make us safer but a great deal to make us poorer less free and more dependent on the federal government. Regardless of the color of the security alert issued by the Homeland Security czar the spending light is always green as pork barrel dollars are showered on programs of dubious worth. Lobbyists lobby for homeland security grants and contracts; corporations and state and local governments are becoming ever more dependent on federal subsidies; the vested interest in prolonging and intensifying the concern about homeland security increases; and lobbyists press for ever more money. As Bennett makes clear with government money comes government control. Law enforcement and emergency response agencies at all levels of government are being effectively nationalized. Police power is being concentrated and the Department of Homeland Security (DHS) envisions a surveillance state that the East German State Police under Communism would have envied. In this hard-hitting critique Bennett argues that all the spending and surveillance will not win the War on Terror or preserve us from natural disasters. The foe cannot be beaten (we're having trouble even finding the enemy) cannot surrender and still has awesome powers to lay waste to American cities and citizens. He argues that we should view terrorism as just one of many other serious threats to individuals and to nations. More sternly he warns that the War on Terror is also a War on Privacy and a War on Liberty.

GBP 42.99
1

International Security Studies Theory and Practice

International Security Studies Theory and Practice

This new and updated edition of International Security Studies provides students with a comprehensive introduction to the subject of security studies with a strong emphasis on the use of case studies to illustrate theoretical debates. In addition to presenting the major theoretical perspectives the book examines a range of important and controversial topics in covering both traditional military and non-military security issues such as WMD proliferation humanitarian intervention food security and environmental security. The volume also offers a wide range of case studies providing detailed analyses of important global security issues. The 37 chapters contain pedagogical features and recommended further reading and are divided into five thematic sections: Conceptual and Theoretical Military Security Non-Military Security Institutions and Security Case Studies Updates for the second edition include: New chapters on cybersecurity and the insecurity of the LGBT community. Substantial revisions to existing chapters to incorporate analysis of important international political developments including the Trump Presidency; ‘Brexit’; North Korean nuclear standoff; the Syrian Civil War; Yemen Civil War; Mediterranean migration crisis; Climate change diplomacy and the Sustainable Development Goals. This textbook will be essential reading for all students of security studies and highly recommended for students of critical security studies human security peace and conflict studies foreign policy and International Relations in general. | International Security Studies Theory and Practice

GBP 34.99
1

Strategic Cyber Security Management

Environmental Security An Introduction

Routledge Handbook of Arctic Security

Human and National Security Understanding Transnational Challenges

Design Against Crime A Human-Centred Approach to Designing for Safety and Security

Social Security

Mobilizing U.S. Industry A Vanishing Option For National Security?

Cyber Security and Business Intelligence Innovations and Machine Learning for Cyber Risk Management

Cyber Security and Business Intelligence Innovations and Machine Learning for Cyber Risk Management

To cope with the competitive worldwide marketplace organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations individuals’ personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including but not limited to Support Vector Machine Neural Networks Extreme Learning Machine Ensemble Learning and Deep Learning Approaches with a goal to apply those to cyber risk management datasets. It will also leverage real-world financial instances to practise business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems data security data forecasting cyber risk modelling fraudulent credit risk detection portfolio management and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system and reduce data breaches and cyber-attack vulnerabilities. | Cyber Security and Business Intelligence Innovations and Machine Learning for Cyber Risk Management

GBP 130.00
1