Search:

Collective security: the why and how / by Ball, Joseph H.(Joseph Hurst),1905-1993.(CARDINAL)219357; World Peace Foundation.(CARDINAL)143654;
Bibliography: pages 61-63.
Subjects: Security, International.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Toward a genuine world security system : an annotated bibliography for layman and scholar / by Williams, Stillman P.(CARDINAL)603689;
Subjects: Bibliographies.; Security, International;
Available copies: 1 / Total copies: 1
unAPI

The problems of lasting peace / by Hoover, Herbert,1874-1964.(CARDINAL)139089; Gibson, Hugh,1883-1954.(CARDINAL)171176;
Subjects: Peace.; Security, International.; International cooperation.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Beyond 1995 : the future of the NPT regime / by Pilat, Joseph F.(CARDINAL)179042; Pendley, Robert E.(CARDINAL)179043;
Includes bibliographical references and index.
Subjects: Nuclear nonproliferation.; Security, International.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Breakthrough : emerging new thinking : Soviet and Western scholars issue a challenge to build a world beyond war = [Proryv] / by Gromyko, A. A.(Anatoliĭ Andreevich)(CARDINAL)128513; Hellman, Martin.(CARDINAL)188435;
Bibliography: pages 273-281.
Subjects: Nuclear arms control.; Security, International.; International relations.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Every Screen on the Planet : The War over Tiktok by Baker-white, Emily;
Every Screen on the Planet is the first major book on one of the most dramatic business stories of our time. Touching on politics, finance, data, and technology, the struggle over TikTok has enormous implications for our information landscape and the technological cold war between the United States and China.Emily Baker-White's engrossing narrative charts TikTok's rise from obscurity into the world's most valuable startup, led by its ambitious founder, Zhang Yiming--arguably the father of the modern recommendation algorithm. Zhang's products reshaped the global internet from a place where you searched for information to one where information came to you. TikTok seemed to know its users in an almost spooky way, provoking wonder and delight. People were hooked. "We intend to become ubiquitous," a new-hire training video said, to put TikTok "on every screen on the planet."But virtually everything about TikTok's users--their interests, locations, and even their unspoken desires--was accessible to staff in Beijing. After Baker-White, a Harvard-trained lawyer and investigative reporter, revealed that Chinese engineers could access Americans' private information, a team of employees used the app to track her location and attempt to expose whistleblowers. This incident triggered an ongoing criminal investigation and escalated the US government's fight against Chinese tech.TikTok was the first Chinese app to become a US juggernaut, and lawmakers soon recognized its potential for surveillance and propaganda--and the threat it might pose in the hands of their rivals. Yet even as hawks in Congress gained support to ban the app, the White House was secretly negotiating for unprecedented control over its information stream. In 2025, when President Donald Trump declined to enforce the so-called ban law, TikTok seemed to complete a miraculous corporate escape. It retained its influence, profits, and power, but now operated at the pleasure of two strongmen: China's Xi Jinping and Trump himself.
Subjects: Social Media; National security; Security, International; Computers;
Available copies: 1 / Total copies: 9
unAPI

International security, the military aspect; report of panel II of the Special Studies Project. by Rockefeller Brothers Fund.(CARDINAL)132818;
Subjects: Security, International.;
Available copies: 2 / Total copies: 2
On-line resources: Suggest title for digitization;
unAPI

Thunderbirds [videorecording] / by Edwards, Anthony,actor; Frakes, Jonathan,director(CARDINAL)365198; Kingsley, Ben,actor(CARDINAL)423809; McCullers, Michael,screenwriter(CARDINAL)342886; Myles, Sophia,actor; Osborne, William,screenwriter; Paxton, Bill,actor(CARDINAL)318705; Studio Canal(CARDINAL)548221; Universal Pictures (Firm)(CARDINAL)318695; Universal Pictures Home Entertainment (Firm)(CARDINAL)340102; Working Title Films(CARDINAL)532039;
Bill Paxton, Anthony Edwards, Sophia Myles, Ben Kingsley.Armed with the latest high-tech vehicles and gadgets, the Tracy family tackles global rescue operations on a daily basis. When their archenemy, The Hood (Ben Kingsley), sabotages the Thunderbirds as part of his master plan to rob the world's richest banks, it's up to Alan, the youngest Tracy, to spring into action before disaster strikes. Rated PG - intense action sequences and languageBlu-ray; 1080p High-Definition Widescreen 1.85:1 ; requires Blu-Ray player
Subjects: Action and adventure films.; Video recordings for the hearing impaired.; Rescue work; Security, International;
Available copies: 1 / Total copies: 1
unAPI

Well aware : master the nine cybersecurity habits to protect your future / by Finney, George,author.;
Includes bibliographical references and index.Foreword / by Valmiki Mukherjee -- Introduction: The nine cybersecurity habits. Literacy ; Skepticism ; Vigilance ; Secrecy ; Culture ; Diligence ; Community ; Mirroring ; Deception -- Conclusion.Key Strategies to Safeguard Your FutureWell Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it's a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered--literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception--drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.This book examines our security challenges using lessons learned from psychology, neuroscience, history, and economics. Business leaders will learn to harness effective cybersecurity techniques in their businesses as well as their everyday lives.
Subjects: Computer security.; Cyber intelligence (Computer security); Internal security.;
Available copies: 1 / Total copies: 1
unAPI

Federal world government. by Johnsen, Julia E.(Julia Emily)(CARDINAL)195297;
Bibliography: pages 251-280.
Subjects: International organization.; International cooperation.; Democracy.; World politics.; Security, International.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI