The conditions for security in Europe in the 21st century differ from those in the second half of the 20th century. The consequences of the East-West conflict no longer determine the security agenda. Due to the pan-European process of integration and cooperation, European countries have the chance of a future together in an “area of peace, freedom, security and justice”. However, the security situation in Europe is determined by new threats and risks. Comprehensive security means that external and internal as well as civilian and military security aspects are closely linked. It goes beyond traditional security issues and includes, inter alia, instruments of economic, social, and health policy. In addition, today's threats are of cross-boarder nature: Threats like attacks on the security of IT systems, organized crime, and climate change appear to be solvable mainly through international cooperation. Thus, the role of international organizations is becoming more important. The 11th Network Conference analysed the existing security architecture of Europe in the above mentioned political areas. The contributions can be found in this publication.
Challenges, risks and threats for security in Europe
bookChallenges, risks and threats for security in Europe
bookKapitalmarkt – Recht und Transaktionen XV
bookKapitalmarkt – Recht und Transaktionen XV
bookCurrent Challenges of European Integration
bookCurrent Challenges of European Integration
bookM&A unter geänderten Vorzeichen
bookM&A unter geänderten Vorzeichen
bookEU Enlargement and European Integration: Challenges and Perspectives
bookEU Enlargement and European Integration: Challenges and Perspectives
book
Russian Cyber Activity – The Grizzly Steppe Report : Strategy and Hacking Techniques Used to Interfere the U.S. Elections and to exploit Government and Private Sectors
U.S. Department of Homeland Security, Federal Bureau of Investigation
bookCYBER SECURITY HANDBOOK Part-2 : Lock, Stock, and Cyber: A Comprehensive Security Handbook
Poonam Devi
bookAlice and Bob Learn Application Security
Tanya Janca
audiobookCC Certified in Cybersecurity Study Guide
Mike Chapple
audiobookMoscow Rules : What Drives Russia to Confront the West
Keir Giles
audiobookDefensive Security Handbook : Best Practices for Securing Infrastructure (2nd Edition)
Amanda Berlin, Lee Brotherston, William F. Reyor III
audiobookThe Grizzly Steppe Report (Unmasking the Russian Cyber Activity) : Official Joint Analysis Report: Tools and Hacking Techniques Used to Interfere the U.S. Elections
U.S. Department of Homeland Security, Federal Bureau of Investigation
bookThe Ultimate Guide -Proxies & VPN's
Magelan Cyber Security
book(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide : 2nd Edition
Ben Malisow
audiobookRethinking IT Security : What Needs to Be Said — How Can We Solve the IT Security Problem Long Term?
Svavar Ingi Hermannsson
audiobookRussian Cyber Attack - Grizzly Steppe Report & The Rules of Cyber Warfare : Hacking Techniques Used to Interfere the U.S. Election and to Exploit Government & Private Sectors, Recommended Mitigation Strategies and International Cyber-Conflict Law
U.S. Department of Defense, Department of Homeland Security, Federal Bureau of Investigation, Strategic Studies Institute, United States Army War College
bookCYBER SECURITY HANDBOOK Part-1 : Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
book