Former Yugoslav Republic of Macedonia Handbook

Former Yugoslav Republic of Macedonia Handbook

Author: United States. Department of Defense

Publisher:

Published: 1993

Total Pages:

ISBN-13:

DOWNLOAD EBOOK

...designed as a ready reference at the unclassified level to provide U.S. military personnel with a base of information necessary for effective operations in the Former Yugoslav Republic of Macedonia (FYRM).


Preventing War in Macedonia

Preventing War in Macedonia

Author: Mark Laity

Publisher:

Published: 2008

Total Pages: 112

ISBN-13:

DOWNLOAD EBOOK

"In 2001, in the aftermath of the war in Kosovo, the stability of the Balkans was once again threatened by flaring ethnic tensions in the former Yugoslav Republic of Macedonia. But civil war was averted. In this Whitehall Paper, Mark Laity gives the first detailed insider's account of the NATO-led international effort that prevented war in Macedonia. Writing from experience as Special Adviser to the NATO Secretary General and personal adviser to the Macedonian President, he offers a unique and incisive account of Operation Essential Harvest, and the actions that made it possible. This rare, and mostly overlooked, example of successful pre-emptive diplomacy has enduring lessons or conflict resolution and peacebuilding in the 21st Century." -- RUSI.


Toward Effective Cyber Defense in Accordance with the Rules of Law

Toward Effective Cyber Defense in Accordance with the Rules of Law

Author: A. Brill

Publisher: IOS Press

Published: 2020-06-18

Total Pages: 126

ISBN-13: 1643680870

DOWNLOAD EBOOK

Information and communication technologies now play a big part in the daily personal and professional lives of us all. Cyberspace – the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education – is part of all our lives. In the last decade, the digital revolution in the South Eastern European (SEE) countries has given more people there access to communication, education, and news than ever before, and we should not underestimate the power of these information and communication technologies. This book presents papers from the NATO Science for Peace and Security Advanced Training Course (ATC) Toward Effective Cyber Defense in Accordance With the Rules of Law, held in Ohrid, Republic of North Macedonia, in November 2019. The course focused on the SEE countries, where, in general, governments have paid appropriate attention to developing cyber defense capacities. In some cases, however, limitations in technological resources have restricted the capabilities of governments to respond to the ever-evolving challenges of defending the cyber domain. Laws and regulations differ from country to country, and the topics covered here were carefully chosen to cover issues in laws and regulations, cyber defense policies and their practical implementation. The series of papers presented in this book will provide a deeper understanding of these topics for scholars, associated professionals in the public and private sectors, and for a more general audience.


Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection

Comprehensive Approach as

Author: D. Čaleta

Publisher: IOS Press

Published: 2014-12-16

Total Pages: 308

ISBN-13: 1614994781

DOWNLOAD EBOOK

The world in which we live is becoming ever more complex, both from the viewpoint of ensuring security, and also because of our level of dependence on technology, as represented by so-called critical infrastructure. Despite the efforts of national security entities in the national and international context, terrorist attacks will probably never be completely preventable. This makes it necessary to prepare the functioning of our systems for the occurrence of a terrorist attack so that they will operate quickly and effectively even in this type of crisis. This book presents the papers delivered at the NATO Advanced Research Workshop: Managing Terrorism Threats to Critical Infrastructure – Challenges for South Eastern Europe, held in Belgrade, Serbia in May 2014. The book is divided into five sections: strategic environment and critical infrastructure protection; information security and counterterrorism considerations; terrorist threats to critical infrastructure operation – environmental aspects; energy security as a key factor of critical infrastructure protection; and national approaches to critical infrastructure protection. The book highlights the main dilemmas and challenges of managing terrorist threats in the region of South Eastern Europe, and will be of interest to all those whose work involves protecting critical infrastructure from the threat of terrorist attack.