You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In recent decades, a significant volume of literature on the subject of counterintelligence has become available. The knowledge given by this literature has addressed the confusion surrounding counterintelligence methods and organizations in addition to explaining certain taboos and stereotypes. Counterintelligence issues are understood differently in European countries in comparison to the rest of the world. The factors accounting for this difference are several: the diversity of political systems, continental law, human rights, history, nations' culture, language(s), economy, geostrategic position, urban concept of cities, etc. Nevertheless, some similarities in counterintelligence methods...
The primary function of the intelligence analyst is to make sense of information about the world, but the way analysts do that work will look profoundly different a decade from now. Technological changes will bring both new advances in conducting analysis and new risks related to technologically based activities and communications around the world. Because these changes are virtually inevitable, the Intelligence Community will need to make sustained collaboration with researchers in the social and behavioral sciences (SBS) a key priority if it is to adapt to these changes in the most productive ways. A Decadal Survey Of The Social and Behavioral Sciences provides guidance for a 10-year research agenda. This report identifies key opportunities in SBS research for strengthening intelligence analysis and offers ideas for integrating the knowledge and perspectives of researchers from these fields into the planning and design of efforts to support intelligence analysis.
This volume presents reflections on a variety of environmental issues in South-Eastern Europe from diverse contemporary scientific disciplines. The contributions address many crucial issues including national environmental policies, economic instruments for preventing crimes against the environment, international waste trafficking, threats to air, water and soil due to mining, management of dump areas, environment protection and food safety from a perspective of public health. The book will be a useful resource for researchers, developers and decision makers interested in the stability and sustainable development of the South-Eastern European countries.
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 paper...
This book comprises selected papers of the International Conferences, ASEA, DRBC and EL 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of advances in software engineering and its Application, disaster recovery and business continuity, education and learning.
Current global economic crises call for social responsibility to replace neo-liberalistic, one-sided and short-term criteria causing monopolies of global enterprises. Humanity’s existence is endangered under the threat of global capitalism, unless the positive concept ‘everyone’s social responsibility impacts everyone in society’ becomes the basis of the new socio-economic order. This concept must be realized together with related concepts of ‘interdependence’ and ‘holism,’ embodying the principles of accountability, transparency, ethical behavior, and respect for stakeholders--to support the rule of law, international norms, and human rights. Range of Perspectives Per Topics and Countries brings forth discussions from researchers from different countries. The contents of this volume include discussions related to community involvement, disaster response and disease epidemics, among other topics. The volume also includes studies on social responsibility standards in a Mexican city as well as a discussion of social responsibility in BIRCS countries.
This book is new in every aspect and not only because neither the official history nor an unofficial history of the KGB, and its many predecessors and successors, exists in any language. In this volume, the author deals with the origins of the KGB from the Tsarist Okhrana (the first Russians secret political police) to the OGPU, Joint State Political Directorate, one of the KGB predecessors between 1923 and 1934. Based on documents from the Russian archives, the author clearly demonstrates that the Cheka and GPU/OPGU were initially created to defend the revolution and not for espionage. The Okhrana operated in both the Russian Empire and abroad against the revolutionaries and most of its ope...
Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications.
Elinizdeki bu kitapta, önemi giderek artan Açık Kaynak İstihbaratı (AKİS) ele alınmaktadır. Dünyadaki muhtelif istihbarat servislerinin ihtiyaçlarının, yaklaşık olarak %80 ile %90’ı açık kaynaklardan elde edilmektedir. Dolayısıyla açık kaynaklarda yer alan verilerin istihbarî açıdan değerlendirilmesinin önemi de artmaktadır. Kitapta, Fetullahçı Terör Örgütü/Paralel Devlet Yapılanması (FETÖ/ PDY) elebaşı Fetullah Gülen’in yapmış olduğu konuşmalar açık kaynak istihbaratı olarak değerlendirilmiş ve söylem analizi yöntemiyle analiz edilmiştir. Böylelikle söylem analizi ve açık kaynak istihbaratının birlikte nasıl çalışılabileceği de ortaya konulmuştur. Gülen’in konuşmalarında 15 Temmuz 2016’da gerçekleşen darbe girişimine dair imalarda bulunduğu deşifre edilmiştir. Açık kaynak istihbaratı, teknolojik inkişaflar ile birlikte geleceğin en kıymetli istihbarat türleri arasında yerini almaktadır. Ortaya konulan bu çalışma ile birlikte, millî güvenliğin sağlanmasında, açık kaynak istihbaratına daha fazla önem verilmesinin ülkemize katkı sağlayacağı değerlendirilmektedir.