• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Poland as a Euro-Atlantic Power the determinants of U.S.-Polish relations 1989-2005

Bielewicz, Marcin D. 12 1900 (has links)
st of its NATO allies, as well as the need to become a valued and effective member of the European Union, despite the latterâ s setback in the course of 2004 and 2005.
32

The formation of the National Security State : the State and the opposition in military Brazil

Alves, Maria Helena Moreira, 1944- January 1982 (has links)
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Political Science, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND DEWEY. / Includes bibliographical references. / by Maria Helena Moreira Alves. / Ph.D.
33

A Comprehensive Study of Economic Security in China

Cho, Hsiu-ting 13 February 2006 (has links)
After the end of the Cold War, with the development of globalization, the battlefield of international competition has transferred from military and political area to economy. This transformation is related to the result of the globalizational interdependence. Although the opening of China is necessary, but the inclination of the interdependency should never be ignorant after connected with world economy. The tendency not only represents the process of Chinese development, but decides China¡¦s diplomatic thought and policy even more. It even also helps to calculate China¡¦s development direction in the future. Therefore, it would be more meaningful to discuss China¡¦s national security with the thought of world interdependence. It would be the point of this essay¡Xthe interdependency¡Xto examine and illustrate the relationship, phases, and nature between China and the world. Except for explain the concept of Chinese economy; it would also compare the history and the features of interdependence. With this comparison, it would reveal the tendency of Chinese economic security and the credibility of this theory. Finally, it would deduce the better way to transform the power of China in the future.
34

Population and resource control measures a conceptual framework for understanding and implementation /

Klosinski, Vance J. January 2009 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
35

The relationship between criminal and terrorist organizations and human smuggling

Lanzante, Joseph A. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Morag, Nadav ; Brannan, David. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Criminal organizations, Terrorist organizations, Drug trafficking organizations, Human smuggling, Information sharing, Corruption, Terrorism, Irish Republican Army, Asylum, Mexico. Includes bibliographical references (p. 87-98). Also available in print.
36

Key issues in the emerging U.S. debate on the Comprehensive Test Ban Treaty

Kane, Christian D. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies(Homeland Security and Defense))--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Yost, David S. ; Wirtz, James J. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Comprehensive Test Ban Treaty, nuclear weapons. Includes bibliographical references (p. 53-58). Also available in print.
37

Information operations : the need for a national strategy /

Morthland, Samuel P. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): John Arquilla, Daniel Boger. Includes bibliographical references (p. 67-70). Also available online.
38

Organized crime and national security: the Albanian case /

Gjoni, Ilir. January 2004 (has links) (PDF)
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Jeff Knopf. Includes bibliographical references (p. 83-87). Also available online.
39

Exposing the seams : the impetus for reforming U.S. counterintelligence /

Gleghorn, Todd E. January 2003 (has links) (PDF)
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2003. / Thesis advisor(s): David C. Tucker, James Russell. Includes bibliographical references (p. 87-91). Also available online.
40

In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by

Civins, Braden Eph 21 December 2011 (has links)
National discourse on cyberconflict has largely focused on defensive concerns, or protecting “critical infrastructure” from cyber threats. By contrast, the U.S. government’s employment of cyberattack is shrouded in secrecy and receives scant public attention. The seminal study on U.S. cyberattack, published by the National Academy of Sciences in 2009, noted that the clandestine nature of U.S. cyber operations hinders “widespread understanding and debate about the nature and implications of U.S. cyberattack.” This secrecy has contributed to a policy and legal framework for cyberattack that the NRC-NAS Report called “ill-formed, underdeveloped and highly uncertain.” Since the NRC-NAS Report was published, the U.S. government has signaled an unprecedented seriousness of purpose in addressing cyberconflict. It has marshaled its cyber resources under the leadership of a single “Cyber Command” and attempted to articulate formal “cyberstrategy.” Media reports from 2010-11 provide rare insight into cyberattack decision-making, and describe gradual development of policy and process for a specific type of cyberattack. The topic of U.S. cyberattack merits revisiting. This Report surveys the current international environment regarding cyberconflict, traces the development of “cyberstrategy” by the Executive Office of the President (EoP) and the Department of Defense (DoD) to make general points about the U.S. approach to cyberattack, and examines the statutory framework applicable to U.S. cyberattack in a narrow set of cases. This Report draws on news media reports about a series of cyberattack incidents to examine the dynamics of the cyberattack policy-making process, discusses recent attempts to address these issues, and summarizes lessons learned. / text

Page generated in 0.1485 seconds