Books on the topic 'Information security fields'

To see the other types of publications on this topic, follow the link: Information security fields.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Information security fields.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

1941-, Bruen Aiden A., Wehlau David L. 1960-, and Canadian Mathematical Society. Special Session on Error Control Codes, Information Theory, and Applied Cryptography, eds. Error-correcting codes, finite geometries, and cryptography: Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada. Providence, R.I: American Mathematical Society, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Romanova, Yuliya, Pavel Muzychkin, Nataliya Zhenova, Lyudmila D'yakonova, Galina Eydlina, Konstantin Miloradov, Svetlana Vokina, and Al'bina Antonenkova. Modern information and communication technologies for successful business. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1073931.

Full text
Abstract:
The textbook contains a verified set of materials about the opportunities and technologies of doing business on the global Internet. Technologies and means of the electronic market, electronic cash flows and possibilities of their management are considered. Special attention is paid to the issues of site construction: tips and step-by-step instructions are given for the direct creation of a site, setting a task and implementing it to order, as well as numerous opportunities and tools for promoting a site on the web. The basics of the security of electronic business activity are presented. The material is presented in a clear and accessible form. For students and undergraduates of various profiles, studying in the fields of "Economics" and "Management", graduate students, as well as entrepreneurs who want to promote their business via the Internet.
APA, Harvard, Vancouver, ISO, and other styles
3

Shitov, Viktor. Information content management. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1842520.

Full text
Abstract:
The textbook describes methods of ensuring quality and compliance with legislation when publishing content, the legislation of the Russian Federation in the field of intellectual property, rules for the use of information materials on the Internet, general principles of differentiation of access rights to information on the Internet, ensuring information security, types of spam and unwanted content, methods and means of combating them, technologies for managing, processing and modifying content, technologies for transmitting information on the network, duties of a moderator of a website / forum / resource, and much more. Meets the requirements of the federal state educational standards of secondary vocational education of the latest generation. For students of secondary vocational education institutions. It can be used when mastering the professional module "Information resources Administration" in the discipline "Information content Management" for the specialty "Information systems and programming" when mastering the qualification "Information Resources Specialist".
APA, Harvard, Vancouver, ISO, and other styles
4

Russkevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.

Full text
Abstract:
The publication is devoted to the investigation of the criminal law aspects of countering crimes committed through the use of modern information and communication technologies (computers, information and communication networks, including the Internet). We analyze the current legislation, the theoretical development and practice in cases of information crimes. The manual complies with federal state educational standards of higher professional education in the field of "Law Enforcement", "Legal provision of national security" and "Jurisprudence".
APA, Harvard, Vancouver, ISO, and other styles
5

Hodakov, Viktor. Natural environment and human activity. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1194879.

Full text
Abstract:
The monograph describes the influence of the natural environment and its natural and climatic conditions on human life and socio-economic systems, which are considered as regions, territories of Eastern Europe. The natural and climatic factors (PCFs) characterizing the natural environment of Eastern Europe (Russia and Ukraine) and Western (England and France) are considered. Eastern Europe is in the zone of negative PCFs, close to critical. The influence of the PCF on the vital activity of the state and man is systematically described: mentality, systemic thinking, human health, ensuring the safety of life, sustainability of development, agricultural production, housing and communal services, construction, industry, information security, parrying of the PCF, the influence of the PCF on the development of science and education. Climate change trends at the global and regional levels are also described. Estimates of the impact of the PCF on the economy of the state and regions, recommendations on the adaptation of the economy to the PCF, the relationship of information security and information about the PCF, information technologies for assessing the sustainability of development and investment attractiveness of territories, conceptual foundations of state anti-crisis management of socio-economic systems are presented. It is intended for researchers, teachers, postgraduates, students specializing in the field of life safety, computer ecological and economic monitoring. It can be used to educate society in the field of the natural environment and its natural and climatic conditions.
APA, Harvard, Vancouver, ISO, and other styles
6

Fedotova, Elena. Computer science. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1200564.

Full text
Abstract:
The basic concepts in the field of computer science are given, the main categories of computer hardware and software, the principles of building the architecture of computer systems are described. The structural organization of data and the basics of algorithmization, types of software, classification of information technologies and systems, modern document management and office management automation systems, the basics of building artificial intelligence systems, geoinformation systems, virtual reality systems, as well as the basics of information security are considered. Meets the requirements of the federal state educational standards of higher education of the latest generation. It is intended for students of higher technical educational institutions studying the discipline "Computer Science", for teachers and specialists working in this field, as well as for those who study this subject area independently.
APA, Harvard, Vancouver, ISO, and other styles
7

Russkevich, Evgeniy. Criminal law and "digital crime": problems and solutions. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.

Full text
Abstract:
The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian Federation (Article 2741 of the Criminal Code of the Russian Federation), developed proposals for the differentiation of criminal liability for attacks on the security of computer data and systems, developed scientifically sound recommendations for qualification. In the second edition, the issues of differentiation of criminal liability for digital crimes by means of the General and Special Parts of the Criminal Code of the Russian Federation are separately worked out. The analysis of the problems of qualification of crimes in the field of computer information, as well as other crimes committed using information and communication technologies, outside of Chapter 28 of the Criminal Code of the Russian Federation. Taking into account the results obtained, a draft resolution of the Plenum of the Supreme Court of the Russian Federation "On judicial practice in cases of crimes in the field of computer information" is presented. It is intended for researchers, teachers, practicing lawyers, students and postgraduates of law schools and faculties.
APA, Harvard, Vancouver, ISO, and other styles
8

Information sharing and national special security events: Preparing for the 2008 presidential conventions : field hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, August 10, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Information sharing and national special security events: Preparing for the 2008 presidential conventions : field hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, August 10, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Social security: Issues relating to agency field offices : briefing report to the chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. Washington, D.C: The Office, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Medicaid: Creative improvements from the field : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, October 28, 2005 : field hearing in Charleston, South Carolina. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Office, General Accounting. Social security: Telephone access enhanced at field offices under demonstration project : report to congressional committees. Washington, D.C: The Office, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Office, General Accounting. Social security: Issues relating to agency field offices : briefing report to the chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. Washington, D.C: The Office, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cathcart, Adam, Christopher Green, and Steven Denney, eds. Decoding the Sino-North Korean Borderlands. NL Amsterdam: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789462987562.

Full text
Abstract:
Since the 1990s, the Chinese-North Korean border region has undergone a gradual transformation into a site of intensified cooperation, competition, and intrigue. These changes have prompted a significant volume of critical scholarship and media commentary across multiple languages and disciplines. Drawing on existing studies and new data, Decoding the Sino-North Korean Borderlands brings much of this literature into concert by pulling together a wide range of insight on the region's economics, security, social cohesion, and information flows. Drawing from multilingual sources and transnational scholarship, this volume is enhanced by the extensive fieldwork undertaken by the editors and contributors in their quests to decode the borderland. In doing so, the volume emphasizes the link between theory, methodology, and practice in the field of Area Studies and social science more broadly.
APA, Harvard, Vancouver, ISO, and other styles
15

Sil'vestrov, Sergey, Vladimir Starovoytov, Vladimir Bauer, Aleksandr Selivanov, Vladimir Lepskiy, Aleksandr Raykov, Svetlana Lipina, et al. Strategic planning in the public sector of the economy. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1081855.

Full text
Abstract:
This collective monograph continues a series of scientific studies and publications on the problems of strategic planning, which have been carried out for several years at the Financial University under the Government of the Russian Federation with the involvement of specialists from other scientific and educational organizations. A series of research papers in 2017-2019 was devoted to the analysis of strategic development risks and the analysis of global strategic planning practice, the general methodology of strategic planning and forecasting (including in the context of ensuring Russia's economic security), the approach to the formation of life cycles of preparation and revision of strategic planning documents and their comparative analysis, the experience of coordinating budget, project and process types of management and financing, monitoring risks and threats, the use of new information tools in the strategic planning complex, including blockchain, and also naturally develops such aspects of previous research as analysis of world practice, coordination of budget, project and process types of management and financing, the use of information technologies. However, at the same time, a special task was set — to approach a comprehensive analysis of the strategic planning process as a whole, especially to study its documentary support as the core of the organization of this process and the implementation of its results in the practice of public administration, as well as to analyze the scientific support of strategic planning as an essential aspect of all strategic planning and strategic management activities in the entirety of its aspects (goal setting, forecast, design, programming, planning, control and audit). It is intended for specialists from the humanities, natural sciences and technical fields of knowledge focused on management and development problems, for undergraduates and postgraduates, as well as for a wide audience of management practitioners, including those related to strategic planning processes in the public sector.
APA, Harvard, Vancouver, ISO, and other styles
16

Bobyr', Maksim, Vitaliy Titov, and Vladimir Ivanov. Design of analog and digital devices. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1070341.

Full text
Abstract:
The textbook contains the material necessary for the formation of students ' knowledge of the basics of analog and digital circuitry and the principles of building digital nodes, instilling skills in the development and design of digital devices, as well as performing practical work and a course project in the discipline "electrical Engineering, electronics and circuit engineering". Methods of calculation of analog circuits and synthesis of discrete devices of combinational type and automata with memory are considered. Examples of calculation of analog circuits and implementation of digital devices for various purposes on integrated circuits are given. Meets the requirements of Federal state educational standards of higher education of the latest generation. For students of higher education institutions studying in the field of training 09.03.01 "computer Science and engineering". It can be useful for students of the areas of training "Design and technology of electronic means", "Biotechnical systems and technologies"and" Information security".
APA, Harvard, Vancouver, ISO, and other styles
17

How is NOAA managing funds to protect the domestic fishing industry: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee, Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, first session, field hearing in Boston, Massachusetts, June 20, 2011. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. Making the census count in urban America: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Eleventh Congress, first session, field hearing in Philadelphia, Pennsylvania, May 11, 2009. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Big ticket waste: Are empty federal buildings emptying the taxpayers' wallets? : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, second session, February 6, 2006, field hearing in Chicago, Illinois. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Making the census count in urban America: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Eleventh Congress, first session, field hearing in Philadelphia, Pennsylvania, May 11, 2009. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

United, States Congress Senate Committee on Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management Government Information and International Security. Katrina and contracting: Blue roof, debris removal, travel trailer case studies : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, second session : field hearing in New Orleans, LA, April 10, 2006. Washington: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ensuring protection of American intellectual property rights for American industries in China: Hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, November 21, 2005, field hearing in Beverly Hills, California. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Blue, gold, and green: How Delaware state and local governments are cutting their energy costs : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, of the One Hundred Eleventh Congress, second session, field hearing in Wilmington, Delaware, February 19, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Office, General Accounting. ADP systems: SSA efforts in implementing its field office modernization : report to the chairman, Committee on Appropriations, U.S. Senate, and the chairman, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Office, General Accounting. Battlefield automation: Field artillery data systems acquisition problems and budget impacts : briefing report to the chairman, Subcommittee on Defense, Committee on Appropriations, House of Representatives. Washington, D.C: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretically exact matching feature are still relevant when creating information security systems such as network intrusion detection systems, antivirus, anti-spam, and wormcontainment systems. The real time multi-pattern string matching task has been a major performance bottleneck in such systems. To speed up the recognition process, developers use a reconfigurable hardware platform based on FPGA devices. Such platform provides almost software flexibility and near-ASIC performance. The most important component of a signature-based information security system in terms of efficiency is the recognition module, in which the multipattern matching task is directly solved. It must not only check each byte of input data at speeds of tens and hundreds of gigabits/sec against hundreds of thousand or even millions patterns of signature database, but also change its structure every time a new signature appears or the operating conditions of the protected system change. As a result of the analysis of numerous examples of the development of reconfigurable information security systems, three most promising approaches to the construction of hardware circuits of recognition modules were identified, namely, content-addressable memory based on digital comparators, Bloom filter and Aho–Corasick finite automata. A method for fast quantification of components of recognition module and the entire system was proposed. The method makes it possible to exclude resource-intensive procedures for synthesizing digital circuits on FPGAs when building complex reconfigurable information security systems and their components. To improve the efficiency of the systems under study, structural-level combinational methods are proposed, which allow combining into single recognition device several matching schemes built on different approaches and their modifications, in such a way that their advantages are enhanced and disadvantages are eliminated. In order to achieve the maximum efficiency of combining methods, optimization methods are used. The methods of: parallel combining, sequential cascading and vertical junction have been formulated and investigated. The principle of multi-level combining of combining methods is also considered and researched. Algorithms for the implementation of the proposed combining methods have been developed. Software has been created that allows to conduct experiments with the developed methods and tools. Quantitative estimates are obtained for increasing the efficiency of constructing recognition modules as a result of using combination methods. The issue of optimization of reconfigurable devices presented in hardware description languages is considered. A modification of the method of affine transformations, which allows parallelizing such cycles that cannot be optimized by other methods, was presented. In order to facilitate the practical application of the developed methods and tools, a web service using high-performance computer technologies of grid and cloud computing was considered. The proposed methods to increase efficiency of matching procedure can also be used to solve important problems in other fields of science as data mining, analysis of DNA molecules, etc. Keywords: information security, signature, multi-pattern matching, FPGA, structural combining, efficiency, optimization, hardware description language.
APA, Harvard, Vancouver, ISO, and other styles
27

Romashkina, N., A. Markov, and D. Stefanovich. International Security, Strategic Stability and Information Technologies. Edited by N. Romashkina and A. Zagorskii. Primakov National Research Institute of World Economy and International Relations, Russian Academy of Sciences (IMEMO), 23, Profsoyuznaya Str., Moscow, 117997, Russian Federation, 2020. http://dx.doi.org/10.20542/978-5-9535-0581-9.

Full text
Abstract:
The monograph is devoted to topical issues of international security and strategic stability in the context of accelerated development of information and communication technologies. It justifies the importance of ensuring international information security. The monograph examines the possibility of establishing an ITarms control regime under the UN auspices. Different aspects of regulation of software security systems and of the use of supercomputers in the context of the international information security are examined. The impact of information and communication technologies on strategic stability is analyzed. This monograph is addressed to specialists in the field of information and communication technologies and international security, university lecturers, students and graduate students of universities, as well as a wide range of readers.
APA, Harvard, Vancouver, ISO, and other styles
28

Aldrich, Richard J. Intelligence and International Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.222.

Full text
Abstract:
Intelligence can be considered a process, a product, and an institution. Institutions in particular point toward the idea of national security, since intelligence services are curiously bound up with both state sovereignty and the core executive. Preemption is perhaps the most important idea that has served to enhance the importance of intelligence. One of the most enduring definitions of intelligence is that it is a special form of information that allows policy makers, or operational commanders, to make more effective decisions. Quite often this intelligence is secret in nature, consisting of information that an opponent does not wish to surrender and actively seeks to hide. And although it is widely accepted that intelligence studies as a field is under-theorized, some areas have received more attention than others. Perhaps because policy makers have seen warning against surprise attack as one of the highest priority intelligence requirements, this area has been the most fully conceptualized. In addition, intelligence agencies themselves have frequently advanced the claim that their ability to lend a general transparency to the international system improves stability. Also, these agencies not only gather intelligence on world affairs but also seek to intervene covertly to change the course of events. Another controversial aspect of intelligence involves the cooperation between intelligence and security services.
APA, Harvard, Vancouver, ISO, and other styles
29

Lloyd, Ian J. Information Technology Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780198830559.001.0001.

Full text
Abstract:
Information Technology Law provides a thorough account of information technology (IT) law. The volume looks at the subject in a wide context, examining the legal response to the latest IT-related developments within society, bringing the law to life and examining how legal issues in IT can affect everyone. This title considers issues in IT law on European and international scales, providing a realistic overview of how the law in this area operates globally and encouraging further thought and investigation about the current issues within IT law. The ninth edition covers major new legislation in this field, including the General Data Protection Regulation and Data Protection Act 2018 l and its impact and scope; especially in the light of recent high-profile security breaches; updated coverage of patent and copyright law including consideration of the role of standard essential patents and standardisation within the IT sector, and digital rights management; discussion of the Consumer Rights Act 2015 with regards to digital products and content; and consideration of new cases in all areas of the law.
APA, Harvard, Vancouver, ISO, and other styles
30

Lloyd, Ian J. Information Technology Law. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787556.001.0001.

Full text
Abstract:
Information Technology Law provides a thorough account of information technology (IT) law. The volume looks at the subject in a wide context, examining the legal response to the latest IT-related developments within society, bringing the law to life and examining how legal issues in IT can affect everyone. This title considers issues in IT law on European and international scales, providing a realistic overview of how the law in this area operates globally and encouraging further thought and investigation about the current issues within IT law. The eighth edition covers major new legislation in this field, including the Investigatory Powers Bill and its proposed impact and scope; the rise in online fraud in the context of the Computer Misuse Act; discussion of personal data in the light of recent high-profile security breaches and new EU directives; new legislation introduced in response to the issue of revenge pornography; updated coverage of patent law, copy protection, and digital rights management; discussion of the Consumer Rights Act 2015 with regards to digital products and content; and consideration of new cases in all areas of the law.
APA, Harvard, Vancouver, ISO, and other styles
31

Battlefield automation: Performance uncertainties are likely when Army fields its first digitized division : report to the chairman, Subcommittee on Defense, Committee on Appropriations, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Yekina, N. Yu. Practical French language course: textbook (for senior students studying in the field of training 10.03.01 "Information security"). Isdatelstvo Prospekt LLC, 2020. http://dx.doi.org/10.31085/9785392314881-2020-192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Chałubińska-Jentkiewicz, Katarzyna, Mirosław Karpiuk, and Jarosław Kostrubiec. The Legal Status of Public Entities in the Field of Cybersecurity in Poland. Institute for Local Self-Government Maribor, 2021. http://dx.doi.org/10.4335/2021.5.

Full text
Abstract:
This monograph provides an in-depth look at the organisation of the national cybersecurity system and the tasks and responsibilities of the entities operating within this system. The objective of the national cybersecurity system is to ensure cybersecurity at the national level, including the uninterrupted provision of essential services and digital services by achieving the appropriate level of security of the information systems used to provide these services and ensuring the handling of incidents. The EU legislators have been explicit in noting that the scale, frequency, and impact of cybersecurity incidents is growing, putting the functioning of information systems at a serious risk. These systems can be targeted by malicious attacks aimed at damaging or disrupting their operations. Such incidents can hamper the functioning of public administration and business, and cause substantial financial losses, undermine user confidence, and lead to considerable losses in national economies, as well as the EU economy at large. Defined as the resilience of information systems against actions which compromise the confidentiality, integrity, availability, and authenticity of processed data, or the related services provided by those information systems, cybersecurity is an area of concern for private and public entities alike. As far as the public-law sphere is concerned, cybersecurity tasks and powers are performed and exercised by government administration, both central and regional, as well as local and regional governments. At the core of the national cybersecurity system in Poland are the public entities which make Poland's cybersecurity policy with the aim of increasing the level of protection against cyberthreats. Despite having different statuses, tasks, and powers, and places in the public sphere, they share the objective of ensuring cyberspace security.
APA, Harvard, Vancouver, ISO, and other styles
34

Aronson, Jonathan D., and Peter F. Cowhey. The Information and Communication Revolution and International Relations. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.425.

Full text
Abstract:
Major trends in information and communication technology (ICT) are transforming the global commercial and technology landscape. Since 1945, the US market has been the most consistent agenda setter for the global market. But now, as economic gloom haunts the world, and as a new President settles in the United States, predictions abound that American dominance in international relations will give way to the leadership of China or others. However, if the United States acts vigorously on the policy front, it can maintain its international leadership position until at least 2025. In addition, the information revolution has also accelerated the changing of international actors’ roles. This is because the web and the information revolution had resulted in tremendous security, political, economic, social, and cultural consequences, which altered the roles of countries, companies, non-governmental actors, and international institutions in the conduct of international relations. ICTs can also leave a significant impact on foreign policy, as these can affect democratic and authoritarian rule, as well as give rise to the “CNN effect,” which is a relatively recent phenomenon which has a tendency to alter the extent, depth, and speed of the new global media. As the ICT revolution spreads across the planet it also resets the international relations playing field, with significant consequences for security, and political, economic, social, and cultural interactions.
APA, Harvard, Vancouver, ISO, and other styles
35

Inspection report: Internal controls over sensitive compartmented information access for selected field intelligence elements. [Washington, D.C.]: U.S. Dept. of Energy, Office of Inspector General, Office of Inspections and Special Inquiries, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Social security: Telephone access to local field offices : report to congressional requesters. Washington, D.C: The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Social security: Telephone access to local field offices : report to congressional requestors. Washington, D.C: The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Social security: Telephone access to local field offices : report to congressional requesters. Washington, D.C: The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Social security: Telephone access enhanced at field offices under demonstration project : report to congressional committees. Washington, D.C: The Office, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pirelli, Gianni, Hayley Wechsler, and Robert J. Cramer. The Behavioral Science of Firearms. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190630430.001.0001.

Full text
Abstract:
The authors present the most relevant factors and considerations involved in the intersection between behavioral science and firearms. The intent is to provide a comprehensive review of these issues in the context of the professional literatures in these areas and to serve as an informational and educational source for a wide range of readers and as a reference text for practitioners, institutional and law enforcement personnel, legislators, and academicians and students in fields such as psychology, criminal justice, and public health. Concepts are presented using a best-practices model that encourages and promotes empirically supported practice, research, policy, and overall decision-making. This book is distinct from all others published in this area, given its inclusion and integration of the following: (1) a focus on the behavioral science of firearm-related matters; (2) review of the professional literatures and case law/legal statutes, particularly as related to firearm development and use, laws, regulations, violence, suicide, and safety; (3) considerations and information from various relevant areas: psychology, sociology, criminal justice, law, and others specific to the general public (e.g., media); (4) presentation of a framework for the assessment of civilians seeking firearms permits, reinstatement of their firearms subsequent to revocation, and considerations for relevant others, such as military, law enforcement and corrections personnel, and security and armed guards; (5) issues related to treatment and self-care in the context of firearm use and ownership; (6) a focus on how the principles and empirical knowledge within behavioral science can inform and improve firearm-related policy, practice, and research.
APA, Harvard, Vancouver, ISO, and other styles
41

Bhushan, Megha, Sailesh Iyer, Ashok Kumar, Tanupriya Choudhury, and Arun Negi, eds. Artificial Intelligence for Smart Cities and Villages: Advanced Technologies, Development, and Challenges. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/97898150492511220101.

Full text
Abstract:
Smart cities and villages have enhanced the quality of lives of residents. Various computer-assisted technologies have been harnessed for the development of smart cities and villages in order to provide solutions for common and niche urban problems. The development of smart environments has been possible due to advances in computing power and artificial intelligence (AI) that have allowed the deployment of scalable technologies. Artificial Intelligence for Smart Cities and Villages: Advanced Technologies, Development, and Challenges summarizes the role of AI in planning and designing smart solutions for urban and rural environments. This book is divided into three sections to impart a better understanding of the topics to readers. These sections are: 1) Demystifying smart cities and villages: A traditional perspective, 2) Smart innovations for rural lifestyle management solutions, and 3) Case studies. Through this book, readers will be able to understand various advanced technologies that are vital to the development of smart cities and villages. The book presents 15 chapters that present effective solutions to urban and rural challenges. Concepts highlighted in chapters include smart farms, indoor object classification systems, smart transportation, blockchains for medical information, humanoid robots for rural education, IoT devices for farming, and much more. This book is intended for undergraduate and graduate engineering students across all disciplines, security providers in the IT and related fields, and trainees working for infrastructure management companies. Researchers and consultants at all levels working in the areas of artificial intelligence, machine learning, IoT, blockchain, network security, and cloud computing will also find the contents beneficial for planning projects involving smart environments.
APA, Harvard, Vancouver, ISO, and other styles
42

Norris, Pippa, and Alessandro Nai, eds. Election Watchdogs. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190677800.001.0001.

Full text
Abstract:
Recent years have seen resurgent interest in the potential capacity of transparency—the public availability of information—to improve democratic governance. Timely, accurate, granular, and freely available information is generally regarded as intrinsically valuable, as well as having many instrumental benefits. In development, transparency and accountability are generally thought to help plug the leaky pipes of corruption and inefficiency, channel public spending more efficiently, and produce better services. In the field of electoral governance, openness about the rules and procedures, outcomes, and decision processes used by electoral authorities is widely assumed to build public trust, improve policymaking, and facilitate accountability. In the age of WikiLeaks, Twitter, and Google, open governance—expanding information and communication—often seems like an unqualified good. Nevertheless, beyond popular buzzword sloganeering, evidence suggests that the impact of transparency on the quality of governance and elections remains mixed. Transparency also has a dark side, threatening trust, privacy, and security. To understand these issues more fully, this book seeks to assess the early-21st-century drive toward open electoral governance and to identify several conditions predicted to determine the success of transparency policies in strengthening electoral integrity. The chapters of this book look at transparency in electoral governance at the international and state levels, as well as within civil society.
APA, Harvard, Vancouver, ISO, and other styles
43

Verzunova, L. V. REPORTS OF THE TSHA ISSUE 293 (PART I). Publishing house of the Russian state agrarian University UN-TA im. K. A. Timiryazeva, 2021. http://dx.doi.org/10.26897/978-5-9675-1834-8-2021-824.

Full text
Abstract:
The collection includes articles based on the reports of scientists of the K. A. Timiryazev RGAU-MSHA, other universities and research institutions at the International Scientific Conference dedicated to the 155th anniversary of the K. A. Timiryazev RGAU-MSHA, which was held on December 2-4, 2020. The collection of materials presents: on topical issues of the world economy and foreign economic activity of management in the agro-industrial complex, mathematics and applications, applied information technologies in agricultural economics and education, on the implementation of national projects and the possibility of using marketing tools and tools to ensure the economic security of agribusiness in the conditions of digitalization of the economy, on the state and development of agribusiness; agricultural relations and the agrarian economy of Russia, financial and tax policy of the agro-industrial complex in the digital economy, on the development of accounting and reporting in the information society, on state and municipal management, on philosophy and integrated communications, history and political science, pedagogy and psychology, on the problems of teaching foreign students, studying and teaching foreign and Russian languages, domestic and foreign science in the field of physical culture.
APA, Harvard, Vancouver, ISO, and other styles
44

Kravitz, Amy, ed. Oxford Handbook of Humanitarian Medicine. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780199565276.001.0001.

Full text
Abstract:
The Oxford Handbook of Humanitarian Medicine (OHHM) is a practical guide covering all aspects of the provision of care in humanitarian situations and complex emergencies, and includes evidence based clinical guidance, aimed specifically at resource limited situations, as well as essential non-clinically related information relevant for people working in field operations and development. The OHHM provides clear recommendations, from the experts, on the unique challenges faced by health providers in humanitarian settings including clinical presentations for which conventional medical training offers little preparation and syndromic management approaches, and includes practical guidance on the integration of Mental Health care and Epidemiology to increase programmatic impact. It also provides detailed information on the contextual issues involved in humanitarian operations, including coordination, health systems design, priorities in displacement, security and logistics and outlines the underlying drivers at play in humanitarian settings, including economics and gender based inequities and violence. It details the relevance of international law, and its practical application in complex emergencies, and covers the changing picture of humanitarian operations, with increasingly complicated and chaotic contexts and the unfortunate escalation of violence against humanitarian providers and facility. The Oxford Handbook of Humanitarian Medicine draws on the accumulated experience of humanitarian practitioners from a variety of disciplines and contexts to provide an easily accessible source of information to guide the reader through the complicated scenarios found in humanitarian settings
APA, Harvard, Vancouver, ISO, and other styles
45

Barela, Steven J., Mark Fallon, Gloria Gaggioli, and Jens David Ohlin, eds. Interrogation and Torture. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190097523.001.0001.

Full text
Abstract:
This volume delves into interrogation and torture at a unique moment as two novel and significant developments unfurl: (1) emerging scientific research reveals non-coercive methods to be the most effective interrogation techniques; (2) efforts are made to integrate this science and practice into international law and global policing initiatives. Of initial import, readers will find contributions presenting some of the burgeoning research to offer an introduction into the scientific literature. Also of genuine value, details are put forward of how this knowledge and science is being brought to bear on the realm of international law and evolving practices through the initiative launched in 2016 by the (now former) UN Special Rapporteur on Torture to create a Universal Protocol setting standards for non-coercive interviewing. Such advancements have the potential to transform the conversation on interrogation and torture in all disciplines, and the contributions in this edited book are meant to spark those discussions. Moreover, this volume can serve as a guide for the makers and implementers of policy who seek lawful, ethical, human-rights compliant—and the most effective—methods to obtain reliable information from those perceived to pose a threat to public safety. To achieve these aims, the editors have brought together highly experienced practitioners and leading scholars in law, philosophy, psychology, neuroscience, social science, national security, and government (36 contributors from 14 different countries) to illuminate meaningful insights from various fields of study.
APA, Harvard, Vancouver, ISO, and other styles
46

Bogusz, Dariusz, Krzysztof Ogonowski, and Adam Rurak, eds. Bezpieczeństwo w portach lotniczych i morskich. Polish Air Force University, 2022. http://dx.doi.org/10.55676/66514-44-7.

Full text
Abstract:
The subject of this publication is broadly understood security of airports and seaports. The paper deals with the issue of labeling dangerous shipments in air transport. There is also a short characterization of the classes of hazardous materials, as well as the rules of packaging, and examples of labels. The knowledge on the cooperation of airport rescue services with other entities of the national rescue and firefighting system was also systematized. Research in this field included the characteristics of the national rescue and firefighting system, the emergency medical system and the emergency notification system. Then, the airport rescue system was discussed, including the discussion of operational tactics, the principles of evacuating passengers, fire extinguishing agents and vehicles. It was explained what the manipulation in this space is, then the phenomenon of disinformation was discussed, in the final part of the research to refer to the need to select information obtained from the virtual sphere.
APA, Harvard, Vancouver, ISO, and other styles
47

Social security: Telephone busy signal rates at local SSA field offices : report to the Chairman, Committee on Ways and Means, House of Representatives. Washington, D.C: The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Social security: Need to improve unit times for estimating field office staff budgets : report to the Secretary of Health and Human Services. Washington, D.C: The Office, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Social security: Need to improve unit times for estimating field office staff budgets : report to the Secretary of Health and Human Services. Washington, D.C: The Office, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Social security: Telephone busy signal rates at local SSA field offices : report to the Chairman, Committee on Ways and Means, House of Representatives. Washington, D.C: The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography