TITLE

HIJACKING & SECURITY

AUTHOR(S)
Baker, David
PUB. DATE
January 2006
SOURCE
Hijacking & Airline Security;2006, preceding p4
SOURCE TYPE
Book
DOC. TYPE
Book
ABSTRACT
The book "Hijacking & Security," by David Baker is presented.
ACCESSION #
31615128

 

Related Articles

  • Downtown district merits no-fly zone designation.  // Crain's Chicago Business;3/24/2003, Vol. 26 Issue 12, p10 

    Reports on the proposal of Mayor Richard Daley for a no-fly zone over downtown Chicago, Illinois. Aim of proposal to increase security for the city; Proposal to ensure safeguard of skyscrapers in the city.

  • A Belgian briefing. Derycke, Erik // Christian Science Monitor;2/19/97, Vol. 89 Issue 58, p19 

    Opinion. States that international security can not be left to `major world powers' and `contact groups' alone, but must be fostered through international cooperation with all nations. Why a country's history should not be grounds for isolation; Debate on how Europe can remain a safe place,...

  • NBC race marks Iraq-Iran-Libya threat.  // Defense;1996, Issue 3, p33 

    Focuses on the threat to international security from the countries of Iran, Iraq and Libya. Proliferation of nuclear, biological and chemical weapons; United States goals in the Middle East and Africa; Iran as the greatest threat to the stability of the region; Constraints working against Iran;...

  • Alternative visions of security in Northeast Asia. Simon, Sheldon W. // Journal of Northeast Asian Studies;Fall96, Vol. 15 Issue 3, p77 

    Focuses on vision of security in Asia-Pacific. Factors which led to regional support for a continued American force presence in Japan and Korea; Europe's trade with Asia; Information on United States' foreign policy values; China's strategic vision; Information on Taiwan's future and regional...

  • The 21st century will challenge our security. Clinton, Bill // Vital Speeches of the Day;10/15/97, Vol. 64 Issue 1, p2 

    Presents a speech by the President of the United States, given before the 52nd session of the United Nations General Assembly on September 22, 1997, dealing with the issue of international security in the 21st century.

  • A complex symbiosis. Nikiwane, Solomon M. // Harvard International Review;Fall95, Vol. 17 Issue 4, p30 

    Examines the connection between regional cooperation in southern Africa and to domestic political and economic reform in each country in the region. Cooperation among countries in the region; Early reliance on external military assistance to maintain security; Need to reorient and rethink the...

  • Pakistan is a rogue state with a rogue army. Ganguli, Amulya // Asian Pacific Post;12/9/2010, p10 

    The author examines the threat posed by Pakistan to international security based on its ties with religious extremists, the large number of Pakistanis who are involved in the country's nuclear and missile programmes, and its paranoia with the growing U.S.-Indian relations.

  • Elements of a new European security order. Treverton, Gregory F. // Journal of International Affairs;Summer91, Vol. 45 Issue 1, p91 

    Analyzes the new security order in Europe, after the revolutions in East Central Europe in 1989. Traditional security concerns; Characteristics of the new security order; Tests for the new order; Framework of the new order; Threats to European security; Role of the United States.

  • Pan-European security: A Soviet scholar's view. Trofimenko, Henry // Journal of International Affairs;Summer91, Vol. 45 Issue 1, p113 

    Studies Pan-European security. Security concerns during the Cold War period; Attainment of strategic parity; Effects of the eradication of disparity in European conventional military power; Framework of the new security order; Role of western countries.

  • What Is Just Intervention?  // Christian Science Monitor;9/23/99, Vol. 91 Issue 209, p10 

    Editorial. Reports on the debate between United States President Bill Clinton and United Nations Secretary-General Kofi Annan over what intervention is defined as and when should national sovereignty be violated.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics