Russia’s Perception and Hierarchy of Security Threats
نویسندگان
چکیده
منابع مشابه
asean and new security threats
association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...
متن کاملsupply and demand security of energy in central asia and the caucasus
امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...
15 صفحه اولNuclear Power and Security Threats
Nuclear facilities have not been designed to withstand a deliberate crash by a jumbo jet full of fuel or many other types of attack. A successful attack could have widespread and catastrophic consequences for both the environment and public health. The extent of damage caused will depend on the type of nuclear facility, the nature of the attack, weather conditions and the success of mitigation ...
متن کاملIoE Security Threats and You
Internet of Everything (IoE) is a newly emerging trend especially in homes. Marketing forces towards smart homes are also accelerating the spread of IoE devices in households. An obvious danger of rapid adoption of these gadgets is that many of them lack controls for protecting the privacy and security of end users from attacks designed to disrupt lives and incur financial losses. Our research ...
متن کاملVirtualization and their Security Threats
Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Connections: The Quarterly Journal
سال: 2005
ISSN: 1812-1098
DOI: 10.11610/connections.04.2.11