Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
4
views
0
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,089
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security : A New Framework for Analysis
CHAPTER 9 Conclusions
edited-book
Publication date:
November 1 1997
Publisher:
Lynne Rienner Publishers
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Numerical Algebra, Matrix Theory, Differential-Algebraic Equations, and Control Theory
Author and book information
Book Chapter
Publication date:
November 1 1997
Pages
: 195-214
DOI:
10.1515/9781685853808-010
SO-VID:
c2d88a48-4b01-4dcd-90b2-82748ac468f2
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. i
Frontmatter
pp. v
Contents
pp. vii
Preface
pp. 1
CHAPTER 1 Introduction
pp. 21
CHAPTER 2 Security Analysis: Conceptual Apparatus
pp. 49
CHAPTER 3 The Military Sector
pp. 71
CHAPTER 4 The Environmental Sector
pp. 95
CHAPTER 5 The Economic Sector
pp. 119
CHAPTER 6 The Societal Sector
pp. 141
CHAPTER 7 The Political Sector
pp. 163
CHAPTER 8 How Sectors Are Synthesized
pp. 195
CHAPTER 9 Conclusions
pp. 215
Bibliography
pp. 231
Acronyms
pp. 233
Index
pp. 239
About the Book
Similar content
2,089
Blast Testing Issues and TBI: Experimental Models That Lead to Wrong Conclusions
Authors:
Charles E. Needham
,
David Ritzel
,
Gregory T. Rule
…
Conclusion: The Past and Future of Warfare in Africa
Authors:
William Reno
Conclusion
Authors:
See all similar