Advanced Introduction to International Conflict and Security ...
Nigel D. White
Advances in Intelligent Data Analysis and Applications
Shu-Chuan Chu & Lingping Kong & Chien-Ming Chen & Jeng-Shyang Pan
Against Cybercrime
Kevin F. Steinmetz
AI Powered Financial Analysis: Harnessing Artificial Intelligence ...
Reactive Publishing & Hayden Van Der Post
AI Strategy and Security
Donnie W. Wendt
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
American Foreign Policy and National Security
Paul Viotti
Artificial Intelligence (AI) in Forensic Sciences
Zeno Geradts & Katrin Franke
Artificial Intelligence and Data Mining Approaches in Security ...
Neeraj Bhargava & Ritu Bhargava & Pramod Singh Rathore & Rashmi Agrawal
Artificial Intelligence and International Relations Theories
Bhaso Ndzendze & Tshilidzi Marwala
Artificial Intelligence in Forensic Science
Kavita Saini & Swaroop S. Sonone & Mahipal Singh Sankhla & Naveen Kumar
At Cold Wars End US Intelligence on the Soviet Union and Eastern ...
Unknown
Boko Haram: Islamism, politics, security and the state in Nigeria
Marc-Antoine Pérouse de Montclos
Borders and Border Walls
Andréanne Bissonnette & Élisabeth Vallet
Catastrophes, Confrontations, and Constraints
Tobias Ide
Chinese International Relations Theory
Jonathan Ping & Anna Hayes & Brett McCormick
Constitutional Law and Politics
David M. O'Brien
Cognitive Bias in Intelligence Analysis
Martha Whitesmith
Cognitive Bias in Intelligence Analysis Testing the Analysis ...
Collected Essays on Political Economy and Wartime Civil Liberties, ...
Peter McMillan
Colonial Encounters in a Time of Global Conflict, 1914-1918
Santanu Das & Anna Maguire & Daniel Steinbach
Combating Terrorism in the 21st Century
Joseph R. Rudolph Jr. & William J. Lahneman
Communicating with Intelligence
M. Patrick Hendrix & James S. Major
Conflict and Transnational Crime
Florian Weigand
Conflict Coaching Fundamentals
Samantha Hardy
Conflict Management and Resolution in South Sudan
Nelson Alusala & Emmaculate Asige Liaga & Martin Revai Rupiya
Conflict of Interest
Jackson Banks
Conflict-Sensitive Conservation
Carl Bruch & Geeta Batra & Anupam Anand & Shehla Chowdhury & Sierra Killian
Countering Air Terrorism
Pavel Pavlovich Hachikyan
Countering Violent Extremism and Terrorism
Stéfanie Von Hlatky
Counter-Terrorism Financing and Iran
Zeynab Malakouti Khah
Counter-Terrorism
Miller, Seumas & Henschke, Adam & Feltes, Jonas Feltes
Criminology of a Character
Nicole Scarano
Criminal Justice Today
Frank Schmalleger
Critical Infrastructure Protection in Homeland Security
Theodore Gyle Lewis
Cross-Industry Applications of Cyber Security Frameworks
Baral, Sukanta Kumar & Goel, Richa & Rahman, Md Mashiur & Sultan, Jahangir & Jahan, Sarkar
Cyber Security and Cyber Laws
dept
Cyber Security
Martti Lehto & Pekka Neittaanmäki
Cyber Security Digital Forensics (Cyber Security Series 2)
Mark Hayward
Cyber Security Intelligence and Analytics
Zheng Xu & Saed Saleh Al Rabaee & Octavio Loyola-González & Nurul Hidayah Ab Rahman
Cybersecurity
George Dimitoglou & Leonidas Deligiannidis & Hamid R. Arabnia
Cyber Security Using Modern Technologies
Om Pal & Vinod Kumar & Rijwan Khan & Bashir Alam & Mansaf Alam
Data Virtualization in the Cloud Era (for I I)
Daniel Abadi & Andrew Mott
Dealing With Regional Conflicts of Global Importance
Pietrzak, Piotr
Democratic Elitism
Natasha Piano
Digital International Relations
Corneliu Bjola & Markus Kornprobst
Disarming Apartheid
Robin E. Möser
Cyber Intelligence Report
Nitin Sharma & Richard Medlin & Justin Casey
Does Counter-Terrorism Work (Richard English)
East German Intelligence and Ireland, 1949–90
Jérôme aan de Wiel
Emerging Trends in Conflict Management. Volume II Track III ...
Ethical Cyber Security Handbook for Home Users: Cyber Security ...
Ezra Sombrío
Ethics and Time in the Philosophy of History
Natan Elgabsi & Bennett Gilbert
Fencing in Democracy Border Walls, Necrocitizenship, and the ...
Miguel Díaz-Barriga and Margaret E. Dorsey
Final Report - National Security Commission on Artificial Intelligence
Foreign Policy and Security Strategy
PAUL S CHULTE
Martin Wight
Gender Violence and the Transnational Politics of the Honor ...
Dana M. Olwan
Geopolitical Change and the Antarctic Treaty System
Shirley V. Scott & Tim Stephens & Jeffrey McGee
Global Jihadist Terrorism
Paul Burke & Doaa’ Elnakhala & Seumas Miller
Green and Transnational Crime in Europe and Beyond
Joanna Beata Banach-Gutierrez & Klaus von Lampe & Paul Larsson & Jackie Harvey & Petrus C. van Duyne & Georgios A. Antonopoulos
Handbook of Intelligent and Sustainable Manufacturing
Ajay Kumar & Parveen & Yang Liu & Rakesh Kumar
Handbook of Military Sciences
Anders McD Sookermany, Harald Høiback
Handbook on the Politics and Governance of Big Data and Artificial ...
Andrej Zwitter & Oskar J. Gstrein
How Realist Is India’s National Security Policy?
Kanti Bajpai
Human Extinction
Émile P. Torres
Human Rights Law and Counter Terrorism Strategies
Diane Webber
Hybrid Conflicts and Information Warfare
Ofer Fridman & Vitaly Kabernik & James C. Pearce
Hybrid Warfare 2.2
Manousos E. Kambouris
Immigration, Environment, and Security on the U.S.-Mexico Border
Lisa Meierotto
Improving the CDC Quarantine Station Network's Response to Emerging ...
National Academies Of Sciences Engineeri & National Academies of Sciences Engineering and Medicine & Health And Medicine Division & Board On Population Health And Public He & Board on Population Health and Public Health Practice & Board on Global Health & Committee on the Analysis to Enhance the Effectiveness of the Federal Quarantine Station Network Based on Lessons from the Covid-19 Pandemic
India's Strategic Culture
Shrikant Paranjpe
Industrial Policy, National Security, and the Perilous Plight ...
Petros C. Mavroidis
Information Warfare in the Age of Cyber Conflict
Christopher Whyte & A. Trevor Thrall & Brian M. Mazanec
Inside Cyber Warfare
Jeffrey Carr
Insider Risk and Personnel Security
Paul Martin
Intelligence Agencies, Technology and Knowledge Production
Rüdiger Bergien & Debora Gerstenberger & Constantin Goschler
Intelligence Analysis and Policy Making
Thomas Juneau & Stephanie Carvin
Intelligence Analysis
John Michael Weaver
Intelligence Analysis Fundamentals
Godfrey Garner & Patrick McGlynn
Intelligence Analysis in the Digital Age
Stig Stenslie & Lars Haugom & Brigt H. Vaage
Intelligence and espionage in the English Republic c. 1600–60
Alan Marshall
Intelligence Operations
Erik Kleinsmith
International Relations and Technological Revolution 4.0
David Hernández Martínez & José Miguel Calvillo Cisneros
International Relations
Steven C. Roach & Alexander D. Barder
PW ONLY IAS
IT Security Controls
Virgilio Viegas & Oben Kuyucu
Literary Theory and Criminology
Rafe McGregor
Lithuania in the global context National security and defence ...
Management, Conflict Resolution and Strategy
Magdalena Kraczla & Anna Wziątek-Staśko
Masking the Truth
Donald Jeffries
Myths and Realities of Cyber Warfare
Nicholas Michael Sambaluk
National Security Entrepreneurs and the Making of American Foreign ...
Vincent Boucher & Charles-Philippe David & Karine Prémont
NATO and the War in Ukraine
Jan Eichler
Negotiating with the Devil
Pierre Hazan
Nigeria and World War II
Chima J. Korieh
OCP Oracle Certified Professional Java SE 17 Developer Practice ...
Jeanne Boyarsky & Scott Selikoff
The Oxford Handbook of Behavioral Political Science
Alex Mintz & Lesley G. Terris
Persuasive technologies in China: implications for the future ...
ASPI & Daria Impiombato & Dr Nathan Attrill & Albert Zhang & Fergus Ryan & Bethany Allen
Practical Digital Forensics: A Guide for Windows and Linux Users
Akashdeep Bhardwaj & Pradeep Singh & Ajay Prasad
Proceedings
Kristijan Krkač & Borna Jalšenjak and Boris Debić
Psychology of Intelligence Analysis (3G Editorial Board)
Python For Effect: Master Data Visualization and Analysis: Learn ...
Tomasz Trebacz
Radical Reporting
Sara I. James
Ransomware Analysis
Claudia Lanza & Abdelkader Lahmadi & Jérôme François
Realism in International Relations: The Making of a Disarrayed ...
Mehmet Tabak
Recent Advances in Computational Intelligence and Cyber Security
Ashok Kumar Singh & Zeeshan Ali Siddiqui & Siddharth Singh & Amit Kumar Singh & Tanveer J. Siddiqui
Religious Parties and the Politics of Civil Liberties
Vineeta Yadav
Report Writing for Crime Scene Investigators
Laura Pazarena & Michael Kessler & Amy Watroba
Research Methods in Critical Security Studies
Mark B. Salter & Can E. Mutlu
Rethinking Corruption
Alina Mungiu-Pippidi
Rethinking Geopolitics
Jeremy Black
Routledge Companion to Global Cyber-Security Strategy
Scott N. Romaniuk & Mary Manjikian
Rural Violence in Contemporary Nigeria
Usman A. Tar & Bashir Bala
Russian Information Warfare
Bilyana Lilly
Science Meets Politics: Machiavelli’s Influence and the Birth ...
Gábor Almási
Secret History
Simon Ball
Securing AI Agents
Ken Huang & Chris Hughes
Security
David A. Welch
Security Framework for The Internet of Things Applications
Salma Abdalla Hamad & Quan Z. Sheng & Wei Emma Zhang
Security in Nigeria
Caroline Varin & Freedom Onuoha
Security Intelligence in the Age of AI
Pushan Kumar Dutta & Bhupinder Singh & Christian Kaunert & Annita Larissa Sciacovelli
Security Threat (Rogue Security and Investigation Book 5)
Evan Grace
Security, Strategy, and Critical Theory
Richard Wyn Jones
Security, Strategy, and Military Dynamics in the South China ...
Gordon Houlden & Scott N. Romaniuk & Nong Hong
Spying Through a Glass Darkly
Cécile Fabre
State Surveillance, Political Policing and Counter-terrorism ...
Vlad Solomon
Strengthening and Democratizing the U.S. Artificial Intelligence ...
NAIRR Task Force
General Strong Security Governance Through Integration and Automation
Priti Sikdar
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
Teaching Political Science and International Relations for Early ...
Michael P. A. Murphy & Misbah Hyder
Terrorism and Counter-terrorism in Saudi Arabia and Indonesia
Sumanto Al Qurtuby
Terrorism Awareness
Robert H. Deatherage, Jr.
Terrorism in the Cold War
Terrorism, Democracy, and Human Security
Ronald Crelinsten
The Architect of Espionage
Samuel M. Katz
The Art of Cyber Warfare
Peter Kestner
The Cyber Intelligence Analyst Cookbook Volume 1
The European Union’s Geopolitics
Mathias Jopp & Johannes Pollak
The External Dimension of the European Union’s Critical Infrastructure ...
Alessandro Lazari & Robert Mikac
The Mental Health of Gifted Intelligent Machines
John Senior & Éva Gyarmathy
The Oxford Handbook of Criminology
Alison Liebling & Shadd Maruna & Lesley McAra
The Oxford Handbook of Philosophy of Political Science
Harold Kincaid & Jeroen van Bouwel
The Palgrave Handbook of Teaching and Research in Political ...
Charity Butcher & Tavishi Bhasin & Elizabeth Gordon & Maia Carter Hallward
The Political Impact of African Military Leaders
Sabella Ogbobode Abidde & Felix Kumah-Abiwu
The Return of Geopolitics and Imperial Conflict
Francesco M. Bongiovanni
The Routledge Handbook of Russian International Relations Studies
Maria Lagutina & Natalia Tsvetkova & Alexander Sergunin
The Soldier-statesman in the Secret World
David Scott Robarge
The Time of Global Politics
Christopher McIntosh
Threat Modeling Best Practices
Derek Fisher
Time and Narrative in Intelligence Analysis
Joshua Yaphe
Today's Civil Rights and Liberties Issues
Kara E. Stooksbury
Top Secret
Bob Burton
Traditional Authority and Security in Contemporary Nigeria
David Ehrhardt & David Oladimeji Alao & M. Sani Umar
Translations of Security
Trine Villumsen Berling & Ulrik Pram Gad & Karen Lund Petersen & Ole Wæver
Transnational Crime Cinema
Aleksander Sedzielarz & Sarah Delahousse
Tyrants on Twitter
David L. Sloss
Unconscious Intelligence in Cybernetic Psychology
Torben Hansen & Henrik Hass
Understanding Cyber-Warfare
Christopher Whyte & Brian Mazanec
Unification of Artificial Intelligence and Psychology
Petros A. M. Gelepithis
WHY POLITICS MATTERS
KEVIN. PATTEN DOOLEY (JOSEPH.)
Wrongful Convictions and Forensic Science Errors
John Morgan