Introduction: East Asia's Contested Security Order
نویسندگان
چکیده
منابع مشابه
Introduction: Contested Competences in the European Union
In this article, we set out an approach to European Union politics that seeks to explain its development using theories of institutional change. In contrast to dominant theories which assume that the Treaties, the governing texts of the European Union, faithfully ensure that the desires of member states are respected, we argue that these theories are incomplete contracts, rife with ambiguities....
متن کاملIntroduction to Unix Security for Security Practitioners
In an age of increasingly sophisticated security tools (e.g., firewalls, virtual private networks, intrusion detection systems, etc.), many people do not consider operating system security a very sexy topic. Indeed, given that the UNIX operating system was originally developed in 1969 and that multiple full-length books have been written on protecting UNIX machines, one might be tempted to dism...
متن کاملIntroduction to Hardware Security
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...
متن کاملMultilateral Security 9.1 Introduction
Often our goal is not to prevent information flowing ‘down’ a hierarchy but to prevent it flowing ‘across’ between departments. Relevant applications range from healthcare to national intelligence, and include most applications where the privacy of individual customers’, citizens’ or patients’ data is at stake. They account for a significant proportion of information processing systems but thei...
متن کاملModern Communication Technology and National Security In the Middle East
One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states. Although national states, specially, in the third world countries, extremely resist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Australian Journal of Politics & History
سال: 2019
ISSN: 0004-9522,1467-8497
DOI: 10.1111/ajph.12589