SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
International Security and National Defense:  A Guide to American, International and Foreign Resources Anthony M. Angiletta Morrison Curator for the Social Sciences Updated 17 February, 2009
Six Simple Dicta on Searching the Web, Google, Socrates or any Index ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Selected Governmental or MilitaryInstitutes,  Centers and Programs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Selected Governmental or MilitaryInstitutes,  Centers and Programs (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Selected Non-Governmental Web Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Selected Non-Governmental  Web Resources (cont’d) ,[object Object],[object Object],[object Object],[object Object]
Selected Non-Governmental  Web Resources (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Selected Stanford-Only Resources ,[object Object],[object Object],[object Object],[object Object],[object Object]
Selected Stanford-Only Resources (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Selected Stanford-Only Resources (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente (8)

Outline of Research Paper- C level
Outline of Research Paper-  C levelOutline of Research Paper-  C level
Outline of Research Paper- C level
 
Outline of Research Paper
Outline of Research PaperOutline of Research Paper
Outline of Research Paper
 
Integrated Marketing Communications and Sales Strategies
Integrated Marketing Communications and Sales StrategiesIntegrated Marketing Communications and Sales Strategies
Integrated Marketing Communications and Sales Strategies
 
Red Blue Presentation
Red Blue PresentationRed Blue Presentation
Red Blue Presentation
 
JSS Winter Issue, Vol. 9, No. 4, Table of Contents
JSS Winter Issue, Vol. 9, No. 4, Table of ContentsJSS Winter Issue, Vol. 9, No. 4, Table of Contents
JSS Winter Issue, Vol. 9, No. 4, Table of Contents
 
MLA CE Course: Third-Party PubMed Tools
MLA CE Course: Third-Party PubMed ToolsMLA CE Course: Third-Party PubMed Tools
MLA CE Course: Third-Party PubMed Tools
 
Third-Party PubMed Tools
Third-Party PubMed ToolsThird-Party PubMed Tools
Third-Party PubMed Tools
 
Research Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectResearch Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural Project
 

Destacado

Dynamic Fire & Security
Dynamic Fire & SecurityDynamic Fire & Security
Dynamic Fire & SecurityRobert Borne
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international securityParas Bhutto
 
International Security 3
International Security 3International Security 3
International Security 3alw1125
 
Dynamic Fire & Security
Dynamic Fire & SecurityDynamic Fire & Security
Dynamic Fire & SecurityRobert Borne
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Destacado (7)

Dynamic Fire & Security
Dynamic Fire & SecurityDynamic Fire & Security
Dynamic Fire & Security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
 
International Security 3
International Security 3International Security 3
International Security 3
 
Dynamic Fire & Security
Dynamic Fire & SecurityDynamic Fire & Security
Dynamic Fire & Security
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar a International Security And National Defense 17 Feb 2009 1

Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009karsalan
 
Terrorism Bibliography
Terrorism BibliographyTerrorism Bibliography
Terrorism BibliographyAdam Pode
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referwildmandelorse
 
Human rights nationalsecurity
Human rights nationalsecurityHuman rights nationalsecurity
Human rights nationalsecurityMargaret Clark
 
Research the agency in depth and discuss what is the main purpose of.docx
Research the agency in depth and discuss what is the main purpose of.docxResearch the agency in depth and discuss what is the main purpose of.docx
Research the agency in depth and discuss what is the main purpose of.docxfathwaitewalter
 
Governance 15 May 2009 1
Governance 15 May 2009 1Governance 15 May 2009 1
Governance 15 May 2009 1soscialsciences
 
Governance 15 May 2009 1
Governance 15 May 2009 1Governance 15 May 2009 1
Governance 15 May 2009 1karsalan
 
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...Jose Katab
 
Nigel-West-Historical-Dictionary-of-International-Intelligence.pdf
Nigel-West-Historical-Dictionary-of-International-Intelligence.pdfNigel-West-Historical-Dictionary-of-International-Intelligence.pdf
Nigel-West-Historical-Dictionary-of-International-Intelligence.pdfTeabeAmet
 
WII_ROA Portfolio Presentation
WII_ROA Portfolio PresentationWII_ROA Portfolio Presentation
WII_ROA Portfolio PresentationAntwain Thomas
 

Similar a International Security And National Defense 17 Feb 2009 1 (20)

Terrorism 15 May 2009
Terrorism 15 May 2009Terrorism 15 May 2009
Terrorism 15 May 2009
 
LAW3PIL- Public International Law
LAW3PIL- Public International LawLAW3PIL- Public International Law
LAW3PIL- Public International Law
 
Oxford handbook
Oxford handbookOxford handbook
Oxford handbook
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
Terrorism Bibliography
Terrorism BibliographyTerrorism Bibliography
Terrorism Bibliography
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
 
Human rights nationalsecurity
Human rights nationalsecurityHuman rights nationalsecurity
Human rights nationalsecurity
 
Book studies62-4-december-2018 1
Book studies62-4-december-2018 1Book studies62-4-december-2018 1
Book studies62-4-december-2018 1
 
Book studies62-4-december-2018
Book studies62-4-december-2018Book studies62-4-december-2018
Book studies62-4-december-2018
 
Studies 62-1-march-2018-extracts
Studies 62-1-march-2018-extractsStudies 62-1-march-2018-extracts
Studies 62-1-march-2018-extracts
 
Research the agency in depth and discuss what is the main purpose of.docx
Research the agency in depth and discuss what is the main purpose of.docxResearch the agency in depth and discuss what is the main purpose of.docx
Research the agency in depth and discuss what is the main purpose of.docx
 
Governance 15 May 2009 1
Governance 15 May 2009 1Governance 15 May 2009 1
Governance 15 May 2009 1
 
Governance 15 May 2009 1
Governance 15 May 2009 1Governance 15 May 2009 1
Governance 15 May 2009 1
 
LAW5ICL International Criminal Law
LAW5ICL International Criminal LawLAW5ICL International Criminal Law
LAW5ICL International Criminal Law
 
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
 
Stanford University
Stanford UniversityStanford University
Stanford University
 
Studies61 4-dec-2017-extracts
Studies61 4-dec-2017-extractsStudies61 4-dec-2017-extracts
Studies61 4-dec-2017-extracts
 
Historical Dictionary of International Intelligence
Historical Dictionary of International IntelligenceHistorical Dictionary of International Intelligence
Historical Dictionary of International Intelligence
 
Nigel-West-Historical-Dictionary-of-International-Intelligence.pdf
Nigel-West-Historical-Dictionary-of-International-Intelligence.pdfNigel-West-Historical-Dictionary-of-International-Intelligence.pdf
Nigel-West-Historical-Dictionary-of-International-Intelligence.pdf
 
WII_ROA Portfolio Presentation
WII_ROA Portfolio PresentationWII_ROA Portfolio Presentation
WII_ROA Portfolio Presentation
 

Más de karsalan

Presentation1
Presentation1Presentation1
Presentation1karsalan
 
Csre 15 May 2009
Csre 15 May 2009Csre 15 May 2009
Csre 15 May 2009karsalan
 
The Environment And Public Policy 12 Jan 2009
The Environment And Public Policy 12 Jan 2009The Environment And Public Policy 12 Jan 2009
The Environment And Public Policy 12 Jan 2009karsalan
 
Public Opinion On Web 15 May 09
Public Opinion On Web 15 May 09Public Opinion On Web 15 May 09
Public Opinion On Web 15 May 09karsalan
 
Urban Studies Revised 15 May 09
Urban Studies Revised 15 May 09Urban Studies Revised 15 May 09
Urban Studies Revised 15 May 09karsalan
 
Ng Ophenomenon 17 Feb 2009
Ng Ophenomenon 17 Feb 2009Ng Ophenomenon 17 Feb 2009
Ng Ophenomenon 17 Feb 2009karsalan
 
Pop Studs Demog 15 May 09
Pop Studs Demog 15 May 09Pop Studs Demog 15 May 09
Pop Studs Demog 15 May 09karsalan
 

Más de karsalan (7)

Presentation1
Presentation1Presentation1
Presentation1
 
Csre 15 May 2009
Csre 15 May 2009Csre 15 May 2009
Csre 15 May 2009
 
The Environment And Public Policy 12 Jan 2009
The Environment And Public Policy 12 Jan 2009The Environment And Public Policy 12 Jan 2009
The Environment And Public Policy 12 Jan 2009
 
Public Opinion On Web 15 May 09
Public Opinion On Web 15 May 09Public Opinion On Web 15 May 09
Public Opinion On Web 15 May 09
 
Urban Studies Revised 15 May 09
Urban Studies Revised 15 May 09Urban Studies Revised 15 May 09
Urban Studies Revised 15 May 09
 
Ng Ophenomenon 17 Feb 2009
Ng Ophenomenon 17 Feb 2009Ng Ophenomenon 17 Feb 2009
Ng Ophenomenon 17 Feb 2009
 
Pop Studs Demog 15 May 09
Pop Studs Demog 15 May 09Pop Studs Demog 15 May 09
Pop Studs Demog 15 May 09
 

Último

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Último (20)

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

International Security And National Defense 17 Feb 2009 1

  • 1. International Security and National Defense: A Guide to American, International and Foreign Resources Anthony M. Angiletta Morrison Curator for the Social Sciences Updated 17 February, 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.