Search Results - inside forward

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2

    Inside out, India and China local politics go global by Antholis, William

    Published 2013
    Table of Contents: “…Jigsaw : counting to 1.3 billion -- Less than perfect unions -- China : promised lands, heartlands, badlands -- India : forward states, backward states, and swing states -- Power politics, inside out -- Differently the same : inside out diplomacy.…”
    Book
  3. 3
  4. 4

    The next great war? the roots of World War I and the risk of U.S.-China conflict /œcedited by Richard N.Rosecrance and Steven E. Miller

    Published 2015
    Table of Contents: “…Richards ; Thucydides, alliance politics, and great power conflict / Charles S. Maier -- The inside story : domestic factors and the roots of war, then and now. …”
    Book
  5. 5

    Security frameworks in contemporary electronic government

    Published 2019
    Table of Contents: “…E-governance and corruption impasse in Nigeria : a developmental expedition synopsis / Opeyemi Aluko, University of Ilorin, Nigeria ; Gabriel Aderinola, University of Ilorin, Nigeria -- DBMS log analytics for detecting insider threats in contemporary organizations / Muhammad Imran Khan, University College Cork, Ireland -- M-government and its applications on public service delivery / Ryma Abassi, isetcom/supcom, Tunisia -- Strengthening cybersecurity in Singapore : challenges, responses and the way forward / Ching Yuen Luk, Nanyang Technological University, Singapore -- M-government and its application on public service delivery / Vannie Naidoo, University of KwaZulu-Natal, South Africa ; Thokozani Nzimakwe, UKZN, South Africa -- The role of social marketing in preventing the spread of non-communicable diseases, case of Tunisia / Ines Mezghani Daoud, Higher Institute of Technological Studies in Communications, Tunisia ; Marwa Meddeb, High Institute of Technological Studies In Communications, Tunisia -- Cyber crime and challenges of securing Nigeria's cyber-space against criminal attacks / Benjamin Assay, Delta State Polytechnic Ogwashi-Uku, Nigeria -- Trust and reputation in digital environments a judicial inkling on e-governance and m-governance : trust and reputation in digital environments : a judicial inkling on e-governance and m-governance / Opeyemi Aluko, University of Ilorin, Nigeria…”
    Book
  6. 6

    Reforming the unreformable lessons from Nigeria by Okonjo-Iweala, Ngozi

    Published 2012
    Book
  7. 7

    Networks and national security dynamics, effectiveness and organisation by Whelan, Chad

    Published 2012
    Book
  8. 8

    Internet security you can afford using Untangle as your internet gateway by Dawson, Christopher

    Published 2015
    Table of Contents: “…--Chapter 4 Whatâ€?s Happening InsideMy Untangle Gateway?--Router Versus Bridge and Other Router-Setup Considerations--The Apps Tab--The Config Tab: Further Setup and Administration--The Underlying Operating System--The Virtual Server Rack: Configuring the Apps--Chapter 5 Network and User Protection Best Practices--DHCP, DNS, and Network Devices--Firewall, Ports, Protocols, and Intrusion Prevention--Malware Protection--Email Protection--User Protection and Training--Content Filtering--Use Case Matrix: Recommendations by Environment--Chapter 6 Implementing Networking Best Practices (or Not) with Untangle--Network Configuration Overview--NAT--Pointing Traffic to a Web Server (Port Forwards)--DHCP Configuration--DNS--Bypass Rules--Advanced Configuration--Chapter 7 Implementing Protection Best Practices (or Not) with Untangle (a.k.a. “The Rackâ€?)…”
    Book