نتایج جستجو برای: national security
تعداد نتایج: 557861 فیلتر نتایج به سال:
The article presents the main content of US National Security Strategy 2022. Particular attention is paid to conceptual difference this concept, chronology its development and modern use. analyzed in relation future (degradation) mankind on basis introduced values Western civilization. A comparative characteristic civilizational Russian civilization given. coercive inversion system society stat...
Iran’s foreign policy toward international organizations has always oscillated between divergence and convergence, depending on the status of the country in question and the statesmen's point of the view. This study aimed to examine the status of international organizations in Iran’s foreign policy. A divergent approach to international organizations was adopted during 1981-1988 and 2005-2013. ...
چکیده ندارد.
چکیده ندارد.
National security has received unprecedented attention from academics, industrial leaders and the general public since September 11, 2001. The resulting worrying situation calls for solutions from a variety of promising areas, such as database technology. Additionally, traditional data management technologies (e.g., query processing and transaction management), data processing technologies (e.g...
I science facing a new environment triggered by the alleged successful espionage by foreign parties, in particular China, aimed at the nation’s nuclear weapons secrets? Several much publicized reports, in particular that of the Cox Commission of the Congress†, the Rudman report by the President’s Foreign Intelligence Advisory Board, and the review of the findings of the intelligence community, ...
June 2006 | Volume 3 | Issue 6 | e171 Two leaders in the global fi ght against HIV/AIDS—Richard Feachem, Executive Director of the Global Fund to Fight AIDS, Tuberculosis, and Malaria, and Peter Piot, Executive Director of the Joint United Nations Programme on HIV/AIDS (UNAIDS)—have recently argued that HIV represents an extraordinary national security threat [1,2]. Their intent has been to app...
INTRODUCTION................................................................................... 409 I. FEDERAL WIRETAPPING LAWS: A SHORT HISTORY............ 412 II. EXTENDING CALEA --WHAT DOES LAW ENFORCEMENT WANT? .......................................................... 418 III. HOW DOES NETWORK-SWITCHING TECHNOLOGY WORK?..........................................................................
MILITARY SECURITY AND ECONOMIC SECURITY AS COMPONENTS OF NATIONAL SECURITY OF THE RUSSIAN FEDERATION
It is always risky to pronounce a verdict of death on ideas, even after an extended period of apparent lifelessness, but I predict that we have seen the last of the "sociologists" in political science. . . . What has happened is that others too have penetrated the characteristically sloppy logic and flabby prose to discover the deeper problems of circularity and vacuousness inherent in the appr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید