Books on the topic 'Security object'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security object.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Thuraisingham, B., R. Sandhu, and T. C. Ting, eds. Security for Object-Oriented Systems. London: Springer London, 1994. http://dx.doi.org/10.1007/978-1-4471-3858-7.
Full textOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Find full textOOPSLA Conference Workshop on Security for Object-oriented Systems (1993 Washington, DC, USA). Security for Object-oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-oriented Systems, Washington DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Find full textBlakley, Bob. CORBA security: An introduction to safe computing with objects. Reading, Mass: Addison-Wesley, 2000.
Find full textHsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textThe search for the secure base: Attachment theory and psychotherapy. Philadelphia, PA: Brunner-Routledge, 2001.
Find full textInc, ebrary, ed. Professional Cocoa application security. Indianapolis, Ind: Wiley, 2010.
Find full textde, Paula Everton G. Clustering, concurrency control, crash recovery, garbage collection, and security in object-oriented database management systems. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textBennett, Stacey Patricia. An object oriented expert system for specifying computer data security requirements in an Open Systems environment. Birmingham: University of Birmingham, 1995.
Find full textExploring in security: Towards an attachment-informed psychoanalytic psychotherapy. Hove, East Sussex: Routledge, 2009.
Find full textOOPSLA (Conference) (1995 Austin, Tex.). Business object design and implementation: OOPSLA '95 workshop proceedings,16 October 1995, Austin, Texas. London: Springer, 1997.
Find full textDuyunov, Vladimir, and Ruslan Zakomoldin. Criminal law impact in the mechanism of ensuring national security. ru: Publishing Center RIOR, 2020. http://dx.doi.org/10.29039/02045-6.
Full text1957-, Patel D., Sutherland Jeffrey Victor, and Miller J, eds. Business object design and implementation II: OOPSLA '96, OOPSLA '97, and OOPSLA '98 workshop proceedings. London: Springer, 1998.
Find full textBerry, Joy Wilt. Security objects. Chicago: Childrens Press, 1987.
Find full textYatake, Kenrō. Obujekuto shikō riron ni yoru faiā wāru sāba no kenshō. Nomi, Japan: JAIST Press, 2006.
Find full textZagladine, Vadim. Notre objectif: Une securite internationale globale. Moscou: Editions de l'Agence de presse Novosti, 1986.
Find full textHirsch, Martin. Sécu : objectif monde: Le défi universel de la protection sociale. [Paris]: Stock, 2011.
Find full textJustin, Gehtland, ed. Rails for Java developers. Raleigh, N.C: Pragmatic Programmer, 2007.
Find full textDolan, Richard M. UFOs and the national security state: An unclassified history. Rochester, N.Y: Keyhole Publishing, 2000.
Find full textLysova, Ekaterina, Oksana Paramonova, Natal'ya Samarskaya, and Natal'ya Yudina. Environmental monitoring. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1069167.
Full textWehrens, Dr Hans Georg. Real Security regarding Immovable Objects - Reflections on a Euro-Mortgage: Chapter 42 of "Towards a European Civil Code". 3rd ed. Den Haag / London / Boston: Kluwer Law International, 2004.
Find full textMarguerite, McCall, and Hanzel Robert, eds. The universal seduction: Piercing the veils of deception. Las Vegas, Nev: Rose Garden, 2001.
Find full textOlmos, Vicente-Juan Ballester. Expedientes insólitos: [el fenómeno OVNI y los archivos de Defensa]. Madrid: Ediciones Temas de Hoy, 1995.
Find full textProkopenko, Igorʹ. Prishelʹtsy gosudarstvennoĭ vazhnosti: Voennai︠a︡ taĭna. Moskva: ĖKSMO, 2011.
Find full textRandle, Kevin D. Case MJ-12: The true story behind the government's UFO conspiracies. New York: HarperTorch, 2002.
Find full textGalinovskaya, Elena, Elena Boltanova, Gennadiy Volkov, Galina Vyphanova, I. Ignat'eva, N. Kichigin, E. Kovaleva, et al. Zones with special conditions of use of territories (problems of the establishment and implementation of the legal regime). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1080400.
Full textDashorst, Martijn. Wicket in action. Greenwich, CT: Manning, 2009.
Find full textDashorst, Martijn. Wicket in action. Greenwich, CT: Manning, 2009.
Find full textRossinskiy, Sergey. Pre-trial proceedings in a criminal case: the nature and methods of collecting evidence. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1244960.
Full textRedfern, Nicholas. Keep out!: Top secret places governments don't want you to know about. Pompton Plains, NJ: New Page Books, 2012.
Find full textTop secret/MAJIC. New York: Marlowe & Co., 1996.
Find full textJ. Paul Getty Museum. Emergency planning handbook. Malibu: J. Paul Getty Museum, 1988.
Find full textMuseum, Royal Ontario. Disaster plan. [Toronto, Ont: The Museum, 1998.
Find full textBlakley, Robert, and Bob Blakley. CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series). Addison Wesley Longman, 1999.
Find full textA focus on object-oriented technology: Experiences & outlooks. [S.l.]: Information Management Forum, 1996.
Find full textThuraisingham, Bhavani M. Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, (Workshops in Computing). Springer, 1994.
Find full textWorkshop on Security for Object-Oriented Systems, R. Sandhu, and B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.
Find full textStuart, Casey-Maslen, Clapham Andrew, Giacca Gilles, and Parker Sarah. Art.1 Object and Purpose. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198723523.003.0005.
Full textMiller, J., C. Casanave, G. Hollowell, D. Patel, and J. Sutherland. Business Object Design and Implementation: OOPSLA'95 Workshop Proceedings. Springer-Verlag Telos, 1997.
Find full textBuzan, Barry, and Lene Hansen. Defining–Redefining Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.382.
Full textWorkshop on Security for Object-Oriented Systems, J. Miller, Jeffrey Victor Sutherland, and D. Patel. Business Object Design and Implementation: Oopsla '96, Oopsla '97, and Oopsla '98 Workshop Proceedings. Springer, 1998.
Find full textNon-Imaging Millimeter and Microwave-Wave Sensors for Concealed Object Detection. Taylor & Francis Group, 2014.
Find full textAdvances in mobile agents systems research: Theory and applications, a framework for mobile agent systems, separation of concerns in mobile object programs, supporting mobility and concurrency, a secure agent framework environment for telecommunication ... Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2000.
Find full textGeneral procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textA, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textA, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textO'Halloran, Barbara Collopy. Creature Comforts: People and Their Security Objects. Houghton Mifflin, 2002.
Find full text1952-, Belsky Jay, and Nezworski Teresa, eds. Clinical implications of attachment. Hillsdale, N.J: L. Erlbaum Associates, 1988.
Find full textBerry, Joy Wilt. Teach Me About Security Objects (Teach Me About Books). Children's Press (CT), 1987.
Find full textDavé, Shilpa S. “Running from the Joint”. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037405.003.0007.
Full text