58 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Managing cyber attacks in international law, business, and relations : in search of cyber peace
by 
Shackelford, Scott J. author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Defining the cyber threat in internet governance -- Who controls cyberspace? Analyzing cyber
Available: Copies:
2. 
Cover image for The new South Africa at twenty : critical perspectives
by 
Vale, Peter C. J., editor.
Format: 
Books
Publication Date 
2014
Excerpt: 
discrimination continue? Why are the poor in revolt? Is free expression under threat? What happened to South
Available: Copies:
3. 
Cover image for Identity process theory : identity, social action and social change
by 
Jaspal, Rusi, 1984- editor.
Format: 
Books
Publication Date 
2014
Excerpt: 
and intractable conflict Neta Oren and Daniel Bar-Tal; 12. The role of perceived threat and identity
Available: Copies:
4. 
Cover image for Failed states and the origins of violence : a comparative analysis of state failure as a root cause of terrorism and political violence
by 
Howard, Tiffiany.
Format: 
Books
Publication Date 
2014
Excerpt: 
threat of transnational terrorism.
Available: Copies:
5. 
Cover image for Refugees and the myth of human rights : life outside the pale of the law
by 
Larking, Emma, author.
Format: 
Books
Publication Date 
2014
Excerpt: 
debate, and to demonstrate the threat posed by contemporary border regimes to rights protection and the
Available: Copies:
6. 
Cover image for China and globalization : critical concepts in economics
by 
Yueh, Linda Y. (Linda Yi-Chuang)
Format: 
Books
Publication Date 
2013
Excerpt: 
.China's export growth and the China safeguard: threats to the world trading system? / M. A. Crowley -- v
Available: Copies:
7. 
Cover image for Marketing database analytics : transforming data for competitive advantage
by 
Banasiewicz, Andrew D.
Format: 
Books
Publication Date 
2013
Excerpt: 
Market -- 10.Behavioral Predictions -- Behavioral Predictions and Decision Support -- Threat Anticipation
Available: Copies:
by 
Wecker, Helene.
Format: 
Books
Publication Date 
2013
Excerpt: 
worlds. But a powerful threat will soon bring Chava and Ahmad together again, challenging their existence
Available: Copies:
9. 
Cover image for Us foreign policy and the rogue state doctrine.
by 
MILES, ALEX.
Format: 
Books
Publication Date 
2013
Excerpt: 
foreign policy establishment. But, what led policymakers and the US military to emphasise the threat of
Available: Copies:
10. 
Cover image for How to sell to retail : the secrets of getting your product to market
by 
Rayner, Clare.
Format: 
Books
Publication Date 
2013
Excerpt: 
dose of `paranoia' is important -- Being aware of the threat of new entrants -- Don't assume you know
Available: Copies:
11. 
Cover image for Introducing globalization : analysis and readings
by 
Mansbach, Richard W., 1943-
Format: 
Books
Publication Date 
2013
Excerpt: 
Demonstrators -- 12.8.Black Bloc & Blue: {A Look at the Anarchists Who May Pose the Biggest Security Threat
Available: Copies:
12. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Online: The Human Threat -- 12.1.Introduction -- 12.2.The Differences Between Cyberspace and the Physical
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Publication Date
Subject
Item Available