Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Person/Organisation
  • 1
    Online-Ressource
    Online-Ressource
    Abingdon, Oxon ; : Routledge, Taylor & Francis Group,
    UID:
    almahu_9949386198802882
    Umfang: 1 online resource : , illustrations, maps.
    ISBN: 9781003006039 , 1003006035 , 1000072274 , 9781000072235 , 1000072231 , 9781000037999 , 1000037991 , 9781000072273
    Serie: Rethinking Asia and international relations
    Inhalt: "How do aspiring and established rising global powers respond to conflict? Using China, the book studies its response to wars and rivalries in the Middle East from the Cold War to the present. Since the People's Republic was established in 1949, China has long been involved in the Middle East and its conflicts, from exploiting or avoiding them to their management, containment or resolution. Using a conflict and peace studies angle, Burton adopts a broad perspective on Chinese engagement by looking at its involvement in the region's conflicts including Israel/Palestine, Iraq before and after 2003, Sudan and the Darfur crisis, the Iranian nuclear deal, the Gulf crisis and the wars in Syria, Libya and Yemen. The book reveals how a rising global and non-Western power handles the challenges associated with both violent and non-violent conflict and the differences between limiting and reducing violence alongside other ways to eliminate the causes of conflict and grievance"--
    Anmerkung: Introduction -- Conflict and its management -- China, Algeria and Egypt : the War of Independence and the Suez Crisis to Camp David -- China and the Palestinian Liberation Organisation : from people's war to the Algiers Declaration, 1967-1988 -- China, the Horn of Africa and the Arabian Peninsula : from militancy to diplomacy during the Cold War -- China and the Iran-Iraq War -- China and Iraq : the Gulf Wars and the war against ISIS -- China and the Palestinian-Israeli conflict since Oslo -- China and the Darfur Crisis in Sudan -- China and Libya : from Gaddafi to the uprising and after -- China and the Syrian Civil War -- China and contemporary conflict in Yemen and the Horn of Africa -- China and the Iran nuclear deal -- China and the Gulf crisis -- Conclusion.
    Weitere Ausg.: Print version: Burton, Guy. China and Middle East conflicts Abingdon, Oxon ; New York, NY : Routledge, 2020. ISBN 9780367438241
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Military history.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949386173702882
    Umfang: 1 online resource (xv, 95 pages) : , illustrations
    ISBN: 9781003001126 , 1003001122 , 9781000038002 , 1000038009 , 9781000037982 , 1000037983 , 9781000037999 , 1000037991
    Inhalt: A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
    Anmerkung: Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index
    Weitere Ausg.: Print version: ISBN 036743069X
    Weitere Ausg.: ISBN 9780367430696
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 1000007191?
Meinten Sie 1000007971?
Meinten Sie 1000032891?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz