Las políticas de Seguridad en el Magreb desde la perspectiva del realismo ofensivo
Texto completo
Documento similar
33 reiterates this principle indicating that «the parties to any dispute, the continuance of which is likely to endanger the maintenance of international peace and security, shall,
For example, feminist security author Lee-Koo argues that the occupations of both Iraq and Afghanistan disproportionately affect the lives of women, however she correctly asserts
• WSSecTech (Web Service s Security Technologies): The main purpose of this stage is to identify a set of WS security standards that will implement the security services identified
The methodology developed for security management and its maturity in SMEs will allow any organization to manage, evaluate and measure the security of it information systems, but
We justify the importance and motivation of security in the migration of legacy systems and we carry out an analysis of different approaches related to security in
MeSSa 2010 addresses research and experimentation results in the development of security metrics, security assurance metrics and security measurement solutions in the
SecurityRules2CubePermissions and SecurityRules2Dimension- Permissions transformations, which process more complex security rules defined in the conceptual model by using
“A Common Criteria Based Security Requirements Engineering Process for the Development of Secure Information Systems ” [38] and “Towards security requirements management for