Journal articles on the topic 'Dept of Defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Dept of Defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
HIROSE, Takeichiryo. "The two-dimensional smoke wind tunnel of the Dept. of Aeronautical Engineering of the National Defence Academy." Journal of the Japan Society for Aeronautical and Space Sciences 36, no. 409 (1988): 100–102. http://dx.doi.org/10.2322/jjsass1969.36.100.
Full textLapidoth, Ruth. "War, Aggression and Self-Defence. By Yoram Dinstein. [Grotius Publications, Sales Dept., P.O. Box 115, Cambridge CB3 9BP, United Kingdom, 1988, xxx + 292 pp., hardbound]." Israel Law Review 23, no. 4 (1989): 557–59. http://dx.doi.org/10.1017/s0021223700009687.
Full textJander, Kai, Lars Braubach, and Alexander Pokahr. "Practical Defense-in-depth Solution for Microservice Systems." Journal of Ubiquitous Systems and Pervasive Networks 11, no. 1 (May 1, 2019): 17–25. http://dx.doi.org/10.5383/juspn.11.01.003.
Full textShasha, Dennis E. "Defense in Depth." Scientific American 286, no. 5 (May 2002): 101. http://dx.doi.org/10.1038/scientificamerican0502-101.
Full textLangerman, Neal. "Defense in Depth." Journal of Chemical Health and Safety 21, no. 1 (January 2014): 43–45. http://dx.doi.org/10.1016/j.jchas.2013.12.004.
Full textGünlük-Senesen, Gülay. "on Deficits, Debt and Defence." Defence and Peace Economics 15, no. 2 (April 2004): 1–2. http://dx.doi.org/10.1080/714866784.
Full textDudzevičiūtė, Gitana, Vida Česnuitytė, and Dalia Prakapienė. "Defence Expenditure–Government Debt Nexus in the Context of Sustainability in Selected Small European Union Countries." Sustainability 13, no. 12 (June 11, 2021): 6669. http://dx.doi.org/10.3390/su13126669.
Full textWu, Guangwei. "ICONE19-43249 PRINCIPLES OF DEFENSE-IN-DEPTH PHILOSOPHY APPLIED IN NPP ENGINEERING MANAGEMENT." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2011.19 (2011): _ICONE1943. http://dx.doi.org/10.1299/jsmeicone.2011.19._icone1943_105.
Full textRanger, Robin. "3. Implications of Missile Defence for Europe: Academic Overview: Past and Present Imperatives for Defences in Depth." Whitehall Papers 55, no. 1 (January 2002): 34–44. http://dx.doi.org/10.1080/02681300209414870.
Full textAnderson, David, Angela Leadbetter, and Bernie Williams. "In defence of the depot clinic." Psychiatric Bulletin 13, no. 4 (April 1989): 177–79. http://dx.doi.org/10.1192/pb.13.4.177.
Full textHunter, Philip. "Defence in depth — protecting the queen." Network Security 2003, no. 6 (June 2003): 17–18. http://dx.doi.org/10.1016/s1353-4858(03)00612-3.
Full textMansfield-Devine, Steve. "The death of defence in depth." Computer Fraud & Security 2016, no. 6 (June 2016): 16–20. http://dx.doi.org/10.1016/s1361-3723(15)30048-8.
Full textMILLER, NASEEM S. "IoM: Defense Dept. Should Update Substance Use Guidelines." Family Practice News 42, no. 16 (October 2012): 9. http://dx.doi.org/10.1016/s0300-7073(12)70658-8.
Full textSteinberg, Jonathan. "Defense, debt, dollars and deficits." Defense Analysis 1, no. 1 (March 1985): 72–74. http://dx.doi.org/10.1080/07430178508405186.
Full textKARAGOL †, ERDAL. "Defence expenditures and external debt in Turkey." Defence and Peace Economics 16, no. 2 (January 2005): 117–25. http://dx.doi.org/10.1080/10242690500070045.
Full textGünlük-Senesen, Gülay. "Special Issue on Deficits, Debt and Defence." Defence and Peace Economics 15, no. 2 (April 2004): 109–10. http://dx.doi.org/10.1080/10242694.2004.10055144.
Full textJelliffe, D. B., and E. F. P. Jelliffe. "Breastfeeding and Immunity: Adaptable Defence in Depth." Journal of Tropical Pediatrics 31, no. 2 (April 1, 1985): 66–67. http://dx.doi.org/10.1093/tropej/31.2.66.
Full textO'Sullivan, Janet. "In Defence of Foakes v. Beer." Cambridge Law Journal 55, no. 2 (July 1996): 219–28. http://dx.doi.org/10.1017/s0008197300098135.
Full textCleghorn, Lance. "Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth." Journal of Information Security 04, no. 03 (2013): 144–49. http://dx.doi.org/10.4236/jis.2013.43017.
Full textGonzález-Ruibal, Alfredo. "In praise of depth." Archaeological Dialogues 18, no. 2 (October 26, 2011): 164–68. http://dx.doi.org/10.1017/s1380203811000213.
Full textKemp, Mike, and Michael Kemp. "Beyond trust: security policies and defence-in-depth." Network Security 2005, no. 8 (August 2005): 14–16. http://dx.doi.org/10.1016/s1353-4858(05)70271-3.
Full textByrne, Paul. "Application firewalls in a defence-in-depth design." Network Security 2006, no. 9 (September 2006): 9–11. http://dx.doi.org/10.1016/s1353-4858(06)70422-6.
Full textSvendsen, Adam D. M. "Advancing “Defence-in-depth”: intelligence and systems dynamics." Defense & Security Analysis 31, no. 1 (January 2, 2015): 58–73. http://dx.doi.org/10.1080/14751798.2014.995337.
Full textColom-Piella, Guillem. "A New Debt Burden for Spain’s Defence Planning." RUSI Journal 164, no. 7 (November 10, 2019): 32–41. http://dx.doi.org/10.1080/03071847.2019.1700685.
Full textWolde‐Rufael, Yemane. "THE DEFENCE SPENDING–EXTERNAL DEBT NEXUS IN ETHIOPIA." Defence and Peace Economics 20, no. 5 (October 2009): 423–36. http://dx.doi.org/10.1080/03066150902868171.
Full textNelson, Linden. "In defense of nuclear depth psychology." American Psychologist 43, no. 4 (April 1988): 321–22. http://dx.doi.org/10.1037/0003-066x.43.4.321.
Full textCohen, Frederick B. "Defense-in-depth against computer viruses." Computers & Security 11, no. 6 (October 1992): 563–79. http://dx.doi.org/10.1016/0167-4048(92)90192-t.
Full textTuckett, Christopher M. "In Defence of R. H. Lightfoot." New Testament Studies 67, no. 3 (June 3, 2021): 454–73. http://dx.doi.org/10.1017/s0028688521000035.
Full textOh, Byung-Seob, and Dong-Hoon Kim. "An Exploratory Study on the Application of Relationship Marketing in the Defence Agency - Focused on In-depth Interviews of Defense Agents -." Journal of the Korean Association of Defense Industry Studies 27, no. 1 (June 30, 2020): 1–13. http://dx.doi.org/10.52798/kadis.2020.27.1.1.
Full textBerndt, Antje, Hanno Lustig, and Şevin Yeltekin. "How Does The US Government Finance Fiscal Shocks?" American Economic Journal: Macroeconomics 4, no. 1 (January 1, 2012): 69–104. http://dx.doi.org/10.1257/mac.4.1.69.
Full textEmery, Carl. "The Vires Defence—“Ultra Vires” as a Defence to Criminal or Civil Proceedings." Cambridge Law Journal 51, no. 2 (July 1992): 308–48. http://dx.doi.org/10.1017/s0008197300095581.
Full textSmith, Ron P. "Debt, Deficits and Defence: The UK Experience 1700-2016." Defence and Peace Economics 31, no. 4 (January 5, 2020): 414–22. http://dx.doi.org/10.1080/10242694.2019.1710996.
Full textSmith, Richard E. "Sidewinder: Defense in depth using type enforcement." International Journal of Network Management 5, no. 4 (July 1995): 219–29. http://dx.doi.org/10.1002/nem.4560050411.
Full textSchwartau, Winn. "“Defense in depth” for information systems survival." International Journal of Intelligence and CounterIntelligence 8, no. 2 (June 1995): 229–34. http://dx.doi.org/10.1080/08850609508435280.
Full textStytz, M. R. "Considering defense in depth for software applications." IEEE Security & Privacy Magazine 2, no. 1 (January 2004): 72–75. http://dx.doi.org/10.1109/msecp.2004.1264860.
Full textVillarón-Peramato, Oscar, Isabel-María García-Sánchez, and Jennifer Martínez-Ferrero. "Capital structure as a control mechanism of a CSR entrenchment strategy." European Business Review 30, no. 3 (May 14, 2018): 340–71. http://dx.doi.org/10.1108/ebr-03-2017-0056.
Full textKaragol, Erdal T., and Aziz Turhan. "EXTERNAL DEBT, DEFENCE EXPENDITURES AND POLITICAL BUSINESS CYCLES IN TURKEY." Defence and Peace Economics 19, no. 3 (June 2008): 217–24. http://dx.doi.org/10.1080/10242690801972170.
Full textGeorgantopoulos, Andreas G. "The Interrelationship between Military Expenditure and External Debt: Patterns of Causation in Northern Africa Countries." Journal of Economics and Behavioral Studies 3, no. 4 (October 15, 2011): 264–73. http://dx.doi.org/10.22610/jebs.v3i4.279.
Full textBARBU, Ionuț-Daniel, and Gabriel PETRICĂ. "Defense in Depth Principle to Ensure Information Security." International Journal of Information Security and Cybercrime 4, no. 1 (June 29, 2015): 41–46. http://dx.doi.org/10.19107/ijisc.2015.01.06.
Full textDazahra, M. N., F. Elmariami, A. Belfqih, and J. Boukherouaa. "A Defense-in-depth Cybersecurity for Smart Substations." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4423. http://dx.doi.org/10.11591/ijece.v8i6.pp4423-4431.
Full textPetraglia, Jonathan, Maneet Bhatia, Yves De Roten, Jean-Nicolas Despland, and Martin Drapeau. "Investigating defense interpretation depth using lag sequential analysis." Archives of Psychiatry and Psychotherapy 20, no. 4 (December 12, 2018): 7–16. http://dx.doi.org/10.12740/app/94400.
Full textPole, Adam. "Sheriffs’ sales during the land war, 1879–82." Irish Historical Studies 34, no. 136 (November 2005): 386–402. http://dx.doi.org/10.1017/s0021121400006398.
Full textSezgin, Selami. "An empirical note on external debt and defence expenditures in Turkey." Defence and Peace Economics 15, no. 2 (April 2004): 199–203. http://dx.doi.org/10.1080/1024269032000110568.
Full textKaragol †, Erdal, and Selami Sezgin ‡. "DO defence expenditures increase debt rescheduling in Turkey? probit model approach." Defence and Peace Economics 15, no. 5 (October 2004): 471–80. http://dx.doi.org/10.1080/1024269042000215921.
Full textChen, Rong Jun, Yong Zhang, and Hong Wei Liu. "Underground Engineering Avoid Incision and Reinforced Technology and Engineering Application." Advanced Materials Research 853 (December 2013): 174–77. http://dx.doi.org/10.4028/www.scientific.net/amr.853.174.
Full textJander, Kai, Lars Braubach, and Alexander Pokahr. "Defense-in-depth and Role Authentication for Microservice Systems." Procedia Computer Science 130 (2018): 456–63. http://dx.doi.org/10.1016/j.procs.2018.04.047.
Full textMatsui, Kazuaki. "“Some Thoughts on Defense in Depth from RIC 2016”." Journal of the Atomic Energy Society of Japan 58, no. 7 (2016): 440–43. http://dx.doi.org/10.3327/jaesjb.58.7_440.
Full textGilbert, Juan E., Jonathan MacDonald, Raquel Hill, Derek T. Sanders, Idongesit Mkpong-Ruffin, E. Vincent Cross, Ken Rouse, Jerome McClendon, and Gregory Rogers. "Prime III: Defense-in-Depth Approach to Electronic Voting." Journal of Information Privacy and Security 4, no. 3 (July 2008): 16–35. http://dx.doi.org/10.1080/2333696x.2008.10855844.
Full textWeber, Sebastian. "Defense in Depth: Sicherheitskonzepte im Inneren von Windows (I)." Datenschutz und Datensicherheit - DuD 32, no. 1 (January 2008): 59–62. http://dx.doi.org/10.1007/s11623-008-0014-y.
Full textWAIBEL, MICHAEL. "Two Worlds of Necessity in ICSID Arbitration: CMS and LG&E." Leiden Journal of International Law 20, no. 3 (August 30, 2007): 637–48. http://dx.doi.org/10.1017/s0922156507004293.
Full text