Introduction: East Asia's Contested Security Order

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introduction: Contested Competences in the European Union

In this article, we set out an approach to European Union politics that seeks to explain its development using theories of institutional change. In contrast to dominant theories which assume that the Treaties, the governing texts of the European Union, faithfully ensure that the desires of member states are respected, we argue that these theories are incomplete contracts, rife with ambiguities....

متن کامل

Introduction to Unix Security for Security Practitioners

In an age of increasingly sophisticated security tools (e.g., firewalls, virtual private networks, intrusion detection systems, etc.), many people do not consider operating system security a very sexy topic. Indeed, given that the UNIX operating system was originally developed in 1969 and that multiple full-length books have been written on protecting UNIX machines, one might be tempted to dism...

متن کامل

Introduction to Hardware Security

Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...

متن کامل

Multilateral Security 9.1 Introduction

Often our goal is not to prevent information flowing ‘down’ a hierarchy but to prevent it flowing ‘across’ between departments. Relevant applications range from healthcare to national intelligence, and include most applications where the privacy of individual customers’, citizens’ or patients’ data is at stake. They account for a significant proportion of information processing systems but thei...

متن کامل

Modern Communication Technology and National Security In the Middle East

One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states.  Although national states, specially, in the third world countries, extremely resist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Australian Journal of Politics & History

سال: 2019

ISSN: 0004-9522,1467-8497

DOI: 10.1111/ajph.12589