• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 326
  • 137
  • 22
  • 21
  • 12
  • 9
  • 7
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 660
  • 334
  • 134
  • 118
  • 109
  • 94
  • 89
  • 65
  • 64
  • 58
  • 53
  • 50
  • 50
  • 43
  • 42
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

How to prepare the National Guard's leadership for successful venture in homeland security

Amundson, Randy J. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Supinski, Stan. "September 2009." Description based on title screen as viewed on November 03, 2009. Author(s) subject terms: National Guard, Homeland Security, Civil Support, Defense Support for Civil Authorities, Military Support for Civil Authorities, Defense Support to Civil Authorities, Military Support to Civil Authorities, Training, Education, State Mission, National Guard Leadership, Nebraska National Guard Includes bibliographical references (p. 93-95). Also available in print.
22

Mass care (ESF-6) preparedness for catastrophic disasters

Charrier, Ronald J. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Gordon, Ellen M. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: mass care, ESF-6, American Red Cross (ARC), Salvation Army (TSA), Southern Baptist Convention, Convoy of Hope, sheltering, disaster shelter, mass feeding, bulk distribution, catastrophic disaster response, New Madrid earthquake, long-term recovery process, National Shelter System (NSS), multi-agency coordination, voluntary agency, post-congregate sheltering policies, Missouri State Emergency Management Agency. Includes bibliographical references (p. 87-91). Also available in print.
23

The northeast drought as a public health problem in Brazil a thesis submitted in partial fulfillment ... Master of Science in Public Health ... /

Aguiar, Plinio Teofilo de. January 1945 (has links)
Thesis (M.S.P.H.)--University of Michigan, 1945.
24

Disaster communication networks : a case study of the Thai Red Cross and its disaster communication response to the Asian tsunami /

Matthews, Tami J., January 2006 (has links) (PDF)
Thesis (M.A.)--Brigham Young University. Dept. of Communications, 2006. / Includes bibliographical references (p. 121-132).
25

Group emergence under stress : a study of collective behavior during the emergency period of community crises /

Parr, Arnold Richard January 1969 (has links)
No description available.
26

Community organizations under stress : a study of interorganizational communication networks during natural disasters /

Brouillette, John Robert January 1970 (has links)
No description available.
27

Analysis of naturally-occurring and technology-based hazards in Indiana's District 6 region / Analysis of naturally occurring and technology based hazards in Indiana's District 6 region

Nehl, Ryan E. January 2007 (has links)
Naturally-occurring and technology-based hazards affect public health and safety to varying degrees. Naturally-occurring hazards include weather-related events and infectious disease epidemics/pandemics. Examples of technology-based hazards include hazardous materials incidents and electrical power outages. Due to limited resources, emergency planners have to prioritize hazards that may affect local jurisdictions. The purpose of the reported study was to construct a hierarchy of public safety hazards at the county and district levels to aid emergency planners. Public safety representatives from Indiana's District 6 region completed a survey, based on the Oregon Emergency Management Hazard Analysis Methodology, which assigns numerical scores to various hazard categories based on history, vulnerability, maximum potential, and probability of occurrence within a given jurisdiction. Participants also completed an open-ended question, in narrative form, to describe any additional hazards that may affect their jurisdiction. Significant differences were found in point totals for various hazards (p = .000). Significant differences were found among public safety disciplines in rating the infectious disease hazard (p = .02). No significant differences were found in point totals between naturally-occurring and technology-based hazards (p = .86). Overall, a high level of agreement between disciplines on rating hazards, and significant differences between hazard categories suggests that hazard category prioritization is warranted. / Department of Natural Resources and Environmental Management
28

The Construction of destruction : an investigation into the social construction of disasters /

Braun, Daniel, January 1900 (has links)
Thesis (M.A.) - Carleton University, 2003. / Includes bibliographical references (p. 108-111). Also available in electronic format on the Internet.
29

Mutual risk : moral economy in environmental insurance

Bennett, Paul January 1999 (has links)
No description available.
30

Wireless security within hastily formed networks

Bradford, Bryan L. 09 1900 (has links)
One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to networked voice, data, and video services for as many users as possible. Following terrorist attacks like those in September 2001 or devastating natural disasters like the December 2004 Indian Ocean Tsunami and Hurricane Katrina in August 2005 users of the HFN will likely include survivors; first responders; local, state, and federal government agencies; non-government organizations; militaries; and others. These varied users will have different purposes for accessing HFN services; some will require their information to remain private while others will not. These needs for privacy and openness appear to present conflicting requirements: provide unrestricted access for many users but ensure â privacyâ or security of at least some information within the network. The purpose of this thesis is three-fold: first, to explore methodologies for securing the HFN; second, to examine commercial off-the-shelf (COTS) products and accepted best practices that provide the necessary security; and third, to provide a limited implementation example and a more robust target architecture that could provide security on the wireless segments while maintaining open access to the HFN and minimizing installation, operation, and maintenance complexity.

Page generated in 0.0697 seconds