Networks and national security dynamics, effectiveness and organisation
Networks as sets of autonomous organisations working together to achieve individual and shared goals are becoming increasingly important across many areas of public administration. The importance of networks is well known but most analysts would agree that we do not know enough about the dynamics an...
Saved in:
| Main Author: | Whelan, Chad (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
London
Routledge Ashgate
2012
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Social networking in recruiment build your social networking expertise to give yourself a cost-effective advantage in the hiring market
by: Belton, Amanda
Published: (2014)
by: Belton, Amanda
Published: (2014)
Profil kepakaran ahli MACFEA
Published: (2012)
Published: (2012)
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017)
by: Collins, Michael (Michael Patrick)
Published: (2017)
Network flows theory, algorithms, and applications
by: Ahuja, Ravindra K., et al.
Published: (2014)
by: Ahuja, Ravindra K., et al.
Published: (2014)
Network flows theory algorithms, and applications
by: Ahuja, Ravindra K.
Published: (1993)
by: Ahuja, Ravindra K.
Published: (1993)
Linear Programming and Network Flows /
by: Bazaraa, Mokhtar S., et al.
Published: (2010)
by: Bazaraa, Mokhtar S., et al.
Published: (2010)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Optimization algorithms for networks and graphs
by: Evans, James R. (James Robert) 1950-
Published: (1992)
by: Evans, James R. (James Robert) 1950-
Published: (1992)
Social network analysis
Published: (2008)
Published: (2008)
Network security know it all
Published: (2008)
Published: (2008)
Network analysis and synthesis
by: Pandey, O.N
Published: (2014)
by: Pandey, O.N
Published: (2014)
Network analysis and design
by: Robiah Yusof
Published: (2006)
by: Robiah Yusof
Published: (2006)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Network Security Fundamentals
Published: (2008)
Published: (2008)
Network security current status and future directions
by: Douligeris
Published: (2007)
by: Douligeris
Published: (2007)
Network analysis
by: Van Valkenburg
Published: (1991)
by: Van Valkenburg
Published: (1991)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Network analysis with applications
by: Stanley, William D.
Published: (1997)
by: Stanley, William D.
Published: (1997)
Network analysis with applications
by: Stanley, William D.
Published: (2003)
by: Stanley, William D.
Published: (2003)
Network analysis with applications
by: Stanley
Published: (2000)
by: Stanley
Published: (2000)
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Network security first step
by: Thomas ,Tom
Published: (2004)
by: Thomas ,Tom
Published: (2004)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Secure computer and network systems modeling, analysis and design
by: Ye
Published: (2008)
by: Ye
Published: (2008)
Network security and management
by: Singh, Brijendra
Published: (2012)
by: Singh, Brijendra
Published: (2012)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
The Tao of network security monitoring beyond intrusion detection
by: Bejtlich ,Richard
Published: (2005)
by: Bejtlich ,Richard
Published: (2005)
Networking in 90 minutes networking to improve your networks!
by: Bannerman, Lindsay
Published: (2007)
by: Bannerman, Lindsay
Published: (2007)
Critical criminology
Published: (2014)
Published: (2014)
Networks and systems
by: Choudhury
Published: (1988)
by: Choudhury
Published: (1988)
Similar Items
-
Social networking in recruiment build your social networking expertise to give yourself a cost-effective advantage in the hiring market
by: Belton, Amanda
Published: (2014) -
Profil kepakaran ahli MACFEA
Published: (2012) -
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017) -
Network flows theory, algorithms, and applications
by: Ahuja, Ravindra K., et al.
Published: (2014) -
Network flows theory algorithms, and applications
by: Ahuja, Ravindra K.
Published: (1993)


