Search Results for National security -- China. - Narrowed by: EnglishSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dNational$002bsecurity$002b--$002bChina.$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300?dt=list2024-12-22T04:50:45ZPower, national security, and transformational global events challenges confronting America, China, and Iranent://SD_ILS/0/SD_ILS:2899342024-12-22T04:50:45Z2024-12-22T04:50:45ZAuthor Johnson, Thomas A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439884232">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering Cyberterrorism The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurityent://SD_ILS/0/SD_ILS:5201792024-12-22T04:50:45Z2024-12-22T04:50:45ZAuthor Montasari, Reza. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520179.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-21920-7">https://doi.org/10.1007/978-3-031-21920-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>China's coming war with Asiaent://SD_ILS/0/SD_ILS:3712132024-12-22T04:50:45Z2024-12-22T04:50:45ZAuthor Holslag, Jonathan, author.<br/>Preferred Shelf Number DS33.4.C5 H65 2015<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-12-22T04:50:45Z2024-12-22T04:50:45ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>China's Security State Philosophy, Evolution, and Politicsent://SD_ILS/0/SD_ILS:2369262024-12-22T04:50:45Z2024-12-22T04:50:45ZAuthor Guo, Xuezhi.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9781139150897">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chinese security policy structure, power and politicsent://SD_ILS/0/SD_ILS:2631602024-12-22T04:50:45Z2024-12-22T04:50:45ZAuthor Ross, Robert S., 1954-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203876015">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>