Zobrazeno 1 - 10
of 129 608
pro vyhledávání: '"Strategic defence"'
Autor:
Dover, Robert (AUTHOR) r.m.dover@lboro.ac.uk, Phythian, Mark (AUTHOR) mp249@le.ac.uk
Publikováno v:
Defence Studies. Sep2011, Vol. 11 Issue 3, p420-444. 25p. 1 Chart.
Autor:
Dorman, Andrew M.1 andrew.dorman@kcl.ac.uk
Publikováno v:
British Journal of Politics & International Relations. Nov2006, Vol. 8 Issue 4, p489-502. 14p.
Autor:
CÎRCIUMARU, Florian, IONIȚĂ, Crăişor Constantin
Externí odkaz:
https://www.ceeol.com//search/book-detail?id=1119552
Autor:
CÎRCIUMARU, Florian, Potîrniche, Marius Titi
Externí odkaz:
https://www.ceeol.com//search/book-detail?id=1119223
Publikováno v:
Annals: Series on Military Sciences, Vol 13, Iss 1, Pp 61-73 (2021)
From the Cold War period until now, several strategies for carrying out wars have emerged, culminating in the "Hybrid War" model. This literature study is a modern approach to strategic defense and brings to the forefront a series of reflective qu
Externí odkaz:
https://doaj.org/article/af1a2d88568b44e4aa6745b1b00be224
Autor:
Topor, Sorin
Publikováno v:
Annals – Series on Military Sciences. 13(1):61-73
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=962021
Autor:
Frey, Carola
Publikováno v:
Revista de istorie militară / Review of Military History. (1-2):101-103
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=947708
Autor:
Anessa L. Kimball
Publikováno v:
The School of Public Policy Publications, Vol 12, Iss 36, Pp 1-24 (2019)
Despite providing European stability through collective defence and crisis management in an exclusive club, NATO faces persistent challenges from strategic insecurities complicated by recent institutional uncertainties. The club’s structure perm
Externí odkaz:
https://doaj.org/article/f88a74f720ef408f8a1d47c2943e7a4d
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:1435-1449
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:975-987
Mobile applications (hereafter, apps) collect a plethora of information regarding the user behavior and his device through third-party analytics libraries. However, the collection and usage of such data raised several privacy concerns, mainly because