Consult more than 203604 documents with no limitation. Our subscription options

Theme : Nsc national security council

Our documents

Filtrer par :

15 janv. 2009
doc

"Why has the common foreign and security policy been so much more difficult to organise than economic cooperation?"

Essay - 5 pages - International relations

One of the most important discussions in the modern-day European Union concerns the lack of effectiveness of common foreign and security policy. As the Union moves towards integration, creating such a policy has become one of its most pressing concerns. I shall consider this question in...

18 juil. 2013
doc

Security vulnerabilities of cloud computing

Case study - 2 pages - Management

Data, for any company, is most important than anything. Companies will take a lot of security measures to ensure the data security and unwanted hacks. This is the major reason companies, which are into data sensitive fields; take a back seat when talking about the cloud computing...

18 juil. 2013
doc

Security issues with cloud computing

Case study - 3 pages - Management

As most of the cloud computing services depend on the internet, the availability of the service is incessant. The only thing a user needs to worry about is the security of the data, which is stored on the cloud network, which is popularly known as shared network. Most of the services...

20 janv. 2009
doc

A Nordic identity in the European security structure?

Essay - 10 pages - European union

The 3rd and 4th December 1998, the President of French Republic Jacques Chirac and the British Prime Minister Tony Blair met in Saint Malo. Both maintained the necessity to give Europe the ability of autonomous action concerning security and defence. This statement comes within the...

29 sept. 2010
doc

Differences and similarities among the contemporary security policies in Nordic countries

Essay - 9 pages - Political science

“Since 1720, all the Nordic countries have remained minor powers on the international stage. As such, the Nordic states have had to adapt to the constraints that are usually beyond their control.” This statement could summarize the geopolitical situation which has shaped the...

07 juil. 2009
doc

Social security in America

Thesis - 7 pages - Social, moral & civic education

Social Security is one of America's most important and successful programs. It has, since 1935, helped to reduce the poverty rate of those 65 and older drastically, having a greater impact than any other anti-poverty measure. Increasing Social Security expenditures since 1960 have...

16 avril 2014
doc

A study on security analysis for selecting appropriate security

Case study - 79 pages - Management

An investment refers to the commitment of funds at present, in anticipation of some positive rate of return in future. Today the spectrum of investment is indeed wide. An investor is confronted with array of investment avenues. Among all investment, investment in equity is best high proportion....

19 oct. 2004
doc

What is human security?

Essay - 6 pages - International relations

The end of Cold War brought new global challenges to the security field. The arousal of new forms of conflict, such as internal wars and terrorism made it important to rethink civilian protection as the centre of this new perspective of security. Threats to security are no...

15 janv. 2009
doc

Supply chain security in the United States

Essay - 10 pages - Management

A global supply chain links the United States and the rest of the world. Across the time, the focus has been put on reducing the costs of transport, and therefore resulted in a decrease of the ship crew, customs duty and requirements. However, Sept 11 posed a clear threat on global exchange, and...

15 janv. 2009
doc

Failure of Social Security

Essay - 6 pages - Economy general

Since the era of what is known as Reaganomics, this country's social security has been in jeopardy for some time. Our forefathers wanted our government to be able to aid in the comfort of our golden years. This generation of baby boomers may be the last ones to benefit from our founding...

16 juin 2009
doc

Security using firewalls

Thesis - 6 pages - Computer science

In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the...

29 sept. 2010
doc

The debate of the carrying of arms in the United State and the role of the NRA (National Rifle Association)

Essay - 4 pages - Political science

The question of the regulation of handguns is 'one of the most divisive social issues in American society' because 'firearms in general, and handguns in particular, are emblematic of individual autonomy and freedom from government intrusion' . This debate is actually centered on...

18 nov. 2010
doc

Is the EU successful in its attempt to create a 'security community' with its neighbors through the elaboration of the European Neighborhood Policy?

Thesis - 6 pages - European union

The aim of this paper is to assess whether or not the EU is efficient in its attempt to build a security community with its neighbors through the implementation of the European Neighborhood Policy (ENP). In order to do so, I will first demonstrate that the EU and its neighbors share, to a...

29 mai 2008
doc

Privatization of Social Security: Will it Work?

Essay - 3 pages - Social, moral & civic education

When President Bush revealed his plan to overhaul Social Security in his speech at the Republican convention, it was received with mixed reactions. President Bush wants to overhaul Social Security and put it on sound financial footing. (Christine Dugas, 2004) According to Henry J....

30 avril 2009
doc

The central role of women in food security in Africa

Thesis - 7 pages - Social, moral & civic education

This paper will explore the problem of food security in Africa. It will provide a general overview of the problem. Then it will relate the issue to the specific ways in which food security involves women in Africa, as producers and consumers of agricultural products. It will show...

21 mai 2009
doc

The study on security analysis for selecting the appropriate security through analyzing economy and industry

Tutorials/exercises - 80 pages - Economy general

An investment refers to the commitment of funds at present, in anticipation of some positive rate of return in future. Today the spectrum of investment is indeed wide. An investor is confronted with array of investment avenues. Among all investment, investment in equity is best high proportion....

06 sept. 2013
doc

The security plan: Private Doctor's office

Case study - 3 pages - Educational studies

The target area is of a private physician's practice. The location for the practice is a known urban part of town. The location of the practice has both benefits and downfalls. Since the practice is located in a very busy and highly populated section of town, the practice is well known and has...

06 déc. 2013
doc

Security information on the internet

Case study - 3 pages - Business strategy

If you decide to use the Internet either as a consumer, business, for information or just surfing the web for entertainment purposes you have to decide whether you want to use or visit websites that use an open or secure environment while on the Internet. In today's “digitally connected...

09 juin 2009
pdf

Security challenges in wireless sensor networks

Thesis - 5 pages - Electronics, mechanics, engineering & technology

Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes. As a result of advances in sensor technology and wireless communication, sensor networks have emerged as an indispensable and important new tool for multiple civilian and military applications, including patient...

12 avril 2010
pdf

Formal security evaluation of ad hoc routing protocols

Thesis - 3 pages - Computer science

Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. If the underlying routing protocol cannot be...

25 sept. 2009
doc

Russia's security policy

Thesis - 6 pages - Political science

Russia's security policy is undeniably complex, a system of political, economic, and social networks that influence the identification of potential threats, and anticipates the steps necessary to strengthen the state's infrastructure. Since the collapse of the Soviet Union, Russia has had...

20 mai 2009
doc

Post harvest management and food security in Africa

Thesis - 4 pages - Social, moral & civic education

Food security, defined by the World Food Summit of 1996 the situation where “all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life”, is one of the major developmental issues facing developing countries in the world. As part...

17 juin 2008
doc

The Specific Methods that can be used by the Organization to improve the overall security of its wireless networks

Essay - 5 pages - Electronics, mechanics, engineering & technology

The advancement of computer technologies has served as the basis for the evolution of organizations. In recent years, the proliferation of wireless technologies has made it possible for employees to work more independently, in some cases eliminating the need for an office. These advances have...

09 juin 2009
doc

Examining the security motivation model of obsessive-compulsive disorder

Thesis - 10 pages - Psychology

Obsessive-compulsive disorder (OCD) is condition marked by persistent and intrusive thoughts (obsessions) and the repetition of relatively stereotyped behaviors despite the recognition that they are irrational (compulsions) (Szechtman & Woody, 2004). Individuals with OCD experience a high need...

16 juin 2009
doc

Network security on Bluetooth

Essay - 5 pages - Electronics, mechanics, engineering & technology

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices...

08 juil. 2009
doc

A study of home security system

Thesis - 27 pages - Electronics, mechanics, engineering & technology

Home security systems provide security from threats such as intruders or thieves, by sounding a siren to grab the attention of the public. Two sensor pairs are placed in the system. Among them one pair of receiver sensors is connected to the entrance of the house and the transmitter...

13 août 2009
doc

A critical analysis of two 2006 information technology security surveys

Case study - 6 pages - Computer science

My analysis of two surveys - the 2006 Australian Computer Crime and Security Survey (AusCERT, 2006) and the Ernst and Young 2006 Global Information Security Survey (Ernst and Young Global Limited, 2006) will proceed systematically according to the following simple scheme, one that...

29 avril 2010
pdf

Analysis of FOSS: An open standard for network security and monitoring

Thesis - 5 pages - Computer science

The aim of the project is to provide a cost effective, secure and easy working environment over a network. This FOSS is very much helpful for educational institutes, non profit organizations and small industries. The GUI provides options to choose from monitoring, blocking, filtering and...

13 juil. 2010
doc

An overview of U.S. social security act, 1935

Thesis - 3 pages - Political science

The US Congress passed the landmark Social Security Act on 14 August 1935 as part of the “new Deal” offered by President Roosevelt. This act established a system of old-age benefits for workers, benefits for victims of industrial accidents, unemployment insurance, and aid for...

29 sept. 2010
pdf

CFSP (Common Foreign and Security Policy) and Non Proliferation

Essay - 12 pages - European union

Since the end of the Cold War, the nature and origins of threats on Europe have changed. This evolution of repartition of powers in the world led some countries to develop their defence and military capabilities, whether it concerns missiles, biological or chemical weapons, or the ultimate...