Search Results - inside forward
Suggested Topics within your search.
Suggested Topics within your search.
- Economic conditions 2
- Causes 1
- Computer networks 1
- Computer security 1
- Corruption 1
- Criminology 1
- Economic policy 1
- Electronic government information 1
- Foreign relations 1
- Free enterprise 1
- Intelligence service 1
- Internet 1
- Internet in public administration 1
- Islamic fundamentalism 1
- Local government 1
- National security 1
- Network analysis (Planning) 1
- Political aspects 1
- Regional disparities 1
- Regionalism 1
- Security measures 1
- Social networks 1
- Terrorism 1
- War on Terrorism, 2001-2009 1
- World War, 1914-1918 1
- prevention 1
-
1
-
2
Inside out, India and China local politics go global
Published 2013Table of Contents: “…Jigsaw : counting to 1.3 billion -- Less than perfect unions -- China : promised lands, heartlands, badlands -- India : forward states, backward states, and swing states -- Power politics, inside out -- Differently the same : inside out diplomacy.…”
Book -
3
-
4
The next great war? the roots of World War I and the risk of U.S.-China conflict /cedited by Richard N.Rosecrance and Steven E. Miller
Published 2015Table of Contents: “…Richards ; Thucydides, alliance politics, and great power conflict / Charles S. Maier -- The inside story : domestic factors and the roots of war, then and now. …”
Book -
5
Security frameworks in contemporary electronic government
Published 2019Table of Contents: “…E-governance and corruption impasse in Nigeria : a developmental expedition synopsis / Opeyemi Aluko, University of Ilorin, Nigeria ; Gabriel Aderinola, University of Ilorin, Nigeria -- DBMS log analytics for detecting insider threats in contemporary organizations / Muhammad Imran Khan, University College Cork, Ireland -- M-government and its applications on public service delivery / Ryma Abassi, isetcom/supcom, Tunisia -- Strengthening cybersecurity in Singapore : challenges, responses and the way forward / Ching Yuen Luk, Nanyang Technological University, Singapore -- M-government and its application on public service delivery / Vannie Naidoo, University of KwaZulu-Natal, South Africa ; Thokozani Nzimakwe, UKZN, South Africa -- The role of social marketing in preventing the spread of non-communicable diseases, case of Tunisia / Ines Mezghani Daoud, Higher Institute of Technological Studies in Communications, Tunisia ; Marwa Meddeb, High Institute of Technological Studies In Communications, Tunisia -- Cyber crime and challenges of securing Nigeria's cyber-space against criminal attacks / Benjamin Assay, Delta State Polytechnic Ogwashi-Uku, Nigeria -- Trust and reputation in digital environments a judicial inkling on e-governance and m-governance : trust and reputation in digital environments : a judicial inkling on e-governance and m-governance / Opeyemi Aluko, University of Ilorin, Nigeria…”
Book -
6
-
7
-
8
Internet security you can afford using Untangle as your internet gateway
Published 2015Table of Contents: “…--Chapter 4 Whatâ€?s Happening InsideMy Untangle Gateway?--Router Versus Bridge and Other Router-Setup Considerations--The Apps Tab--The Config Tab: Further Setup and Administration--The Underlying Operating System--The Virtual Server Rack: Configuring the Apps--Chapter 5 Network and User Protection Best Practices--DHCP, DNS, and Network Devices--Firewall, Ports, Protocols, and Intrusion Prevention--Malware Protection--Email Protection--User Protection and Training--Content Filtering--Use Case Matrix: Recommendations by Environment--Chapter 6 Implementing Networking Best Practices (or Not) with Untangle--Network Configuration Overview--NAT--Pointing Traffic to a Web Server (Port Forwards)--DHCP Configuration--DNS--Bypass Rules--Advanced Configuration--Chapter 7 Implementing Protection Best Practices (or Not) with Untangle (a.k.a. “The Rackâ€?)…”
Book


