Books on the topic 'Security object'

To see the other types of publications on this topic, follow the link: Security object.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security object.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Thuraisingham, B., R. Sandhu, and T. C. Ting, eds. Security for Object-Oriented Systems. London: Springer London, 1994. http://dx.doi.org/10.1007/978-1-4471-3858-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

OOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

OOPSLA Conference Workshop on Security for Object-oriented Systems (1993 Washington, DC, USA). Security for Object-oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-oriented Systems, Washington DC, USA, 26 September 1993. London: Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blakley, Bob. CORBA security: An introduction to safe computing with objects. Reading, Mass: Addison-Wesley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The search for the secure base: Attachment theory and psychotherapy. Philadelphia, PA: Brunner-Routledge, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Inc, ebrary, ed. Professional Cocoa application security. Indianapolis, Ind: Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

de, Paula Everton G. Clustering, concurrency control, crash recovery, garbage collection, and security in object-oriented database management systems. Monterey, Calif: Naval Postgraduate School, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bennett, Stacey Patricia. An object oriented expert system for specifying computer data security requirements in an Open Systems environment. Birmingham: University of Birmingham, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Exploring in security: Towards an attachment-informed psychoanalytic psychotherapy. Hove, East Sussex: Routledge, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

OOPSLA (Conference) (1995 Austin, Tex.). Business object design and implementation: OOPSLA '95 workshop proceedings,16 October 1995, Austin, Texas. London: Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Duyunov, Vladimir, and Ruslan Zakomoldin. Criminal law impact in the mechanism of ensuring national security. ru: Publishing Center RIOR, 2020. http://dx.doi.org/10.29039/02045-6.

Full text
Abstract:
The monograph examines the social and legal nature of the category "national security" as a socially significant good, an object of criminal law protection and a general object of crimes. The existence of a specific "sphere of crimes and crime" in public life is substantiated, its general characteristics are given, and the state of crime is analyzed as one of the most dangerous threats to national security in modern conditions. The problem of ensuring national security by criminal law means, the place and role of criminal policy and criminal law in the policy of combating crime and ensuring the national security of Russia are considered. Defines the concept of criminal law impact as a law-mediated reaction of the state to crime and crime, one of the key directions of the policy of combating crime, a comprehensive criminal law institution and one of the elements of the mechanism for ensuring national security. The publication is intended for students, postgraduates, researchers, teachers of law schools, employees of law enforcement agencies and all persons interested in the problems of law and law enforcement.
APA, Harvard, Vancouver, ISO, and other styles
13

1957-, Patel D., Sutherland Jeffrey Victor, and Miller J, eds. Business object design and implementation II: OOPSLA '96, OOPSLA '97, and OOPSLA '98 workshop proceedings. London: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Berry, Joy Wilt. Security objects. Chicago: Childrens Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yatake, Kenrō. Obujekuto shikō riron ni yoru faiā wāru sāba no kenshō. Nomi, Japan: JAIST Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zagladine, Vadim. Notre objectif: Une securite internationale globale. Moscou: Editions de l'Agence de presse Novosti, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hirsch, Martin. Sécu : objectif monde: Le défi universel de la protection sociale. [Paris]: Stock, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Justin, Gehtland, ed. Rails for Java developers. Raleigh, N.C: Pragmatic Programmer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Dolan, Richard M. UFOs and the national security state: An unclassified history. Rochester, N.Y: Keyhole Publishing, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lysova, Ekaterina, Oksana Paramonova, Natal'ya Samarskaya, and Natal'ya Yudina. Environmental monitoring. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1069167.

Full text
Abstract:
Outlines General environmental monitoring. Special attention is paid to the monitoring of atmospheric air, water objects, soil-ecological monitoring and biodiversity monitoring. Can be useful for students studying in areas of training 20.03.01 "Technospheric security", specialization "environmental Protection and resource saving", "Engineering protection of environment", as well as for professionals in the field of environmental protection.
APA, Harvard, Vancouver, ISO, and other styles
21

Wehrens, Dr Hans Georg. Real Security regarding Immovable Objects - Reflections on a Euro-Mortgage: Chapter 42 of "Towards a European Civil Code". 3rd ed. Den Haag / London / Boston: Kluwer Law International, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Marguerite, McCall, and Hanzel Robert, eds. The universal seduction: Piercing the veils of deception. Las Vegas, Nev: Rose Garden, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Olmos, Vicente-Juan Ballester. Expedientes insólitos: [el fenómeno OVNI y los archivos de Defensa]. Madrid: Ediciones Temas de Hoy, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Prokopenko, Igorʹ. Prishelʹtsy gosudarstvennoĭ vazhnosti: Voennai︠a︡ taĭna. Moskva: ĖKSMO, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Randle, Kevin D. Case MJ-12: The true story behind the government's UFO conspiracies. New York: HarperTorch, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Galinovskaya, Elena, Elena Boltanova, Gennadiy Volkov, Galina Vyphanova, I. Ignat'eva, N. Kichigin, E. Kovaleva, et al. Zones with special conditions of use of territories (problems of the establishment and implementation of the legal regime). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1080400.

Full text
Abstract:
The peculiarities of the modern spatial development necessitated the development of organizational, managerial and legal measures to reduce the risks of neighbourhood objects that have a negative impact on humans and the environment, as well as to strengthen the protection of especially dangerous or sensitive objects. Introduction to the Land code of the Russian Federation the concept of "zones with special conditions of use of territories" is one of the promising solutions to the above tasks and is aimed at ensuring sanitary and epidemiological welfare of the population, industrial safety, safety in operating all types of transport, defence and state security, environmental protection etc. The Handbook describes the concept and the legal nature of the zones with special conditions of use of territories as a new category, which should become a full part of fur- the mechanism of the land law regulation. Describes the evolution of national legislation on conservation and protection zones, the analysis of the regulation of similar zones in foreign legislation. Special attention is paid to General issues of the legal regime of these zones, the specifics of their establishment and accounting. Researched legal requirements for the adherence of all types of zones with special conditions of use. For practitioners and specialists in the field of state and municipal administration, scientific workers and lecturers of higher and secondary professional educational institutions, students, graduates, and also for a wide range of readers.
APA, Harvard, Vancouver, ISO, and other styles
27

Dashorst, Martijn. Wicket in action. Greenwich, CT: Manning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Dashorst, Martijn. Wicket in action. Greenwich, CT: Manning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Rossinskiy, Sergey. Pre-trial proceedings in a criminal case: the nature and methods of collecting evidence. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1244960.

Full text
Abstract:
The monograph is devoted to a comprehensive review of the problems of pre-trial evidence collection as one of the stages of the general procedural mechanism aimed at establishing the circumstances relevant to the criminal case. The essence, methodological basis and system of investigative actions, forensic examinations and other procedural methods of collecting evidence that make up the modern arsenal of bodies of inquiry and preliminary investigation are investigated. The main cognitive and security technologies used in conducting investigative and other procedural actions are highlighted. The problems of the theory and legal regulation of the general rules of their implementation, the procedural status of their participants, fixing their progress and results, judicial control over their production are reflected; the actual problems of investigative inspection, examination, search, interrogation, confrontation, forensic examination, as well as the presentation, demand and seizure (seizure) of objects and documents are considered. Special attention is paid to the applied aspects, the analysis of errors and difficulties that arise in modern law enforcement practice, and possible ways to overcome them are proposed. For researchers and practitioners, teachers, postgraduates( adjuncts), students, as well as anyone interested in topical issues of criminal procedure law and criminology.
APA, Harvard, Vancouver, ISO, and other styles
30

Redfern, Nicholas. Keep out!: Top secret places governments don't want you to know about. Pompton Plains, NJ: New Page Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Top secret/MAJIC. New York: Marlowe & Co., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

J. Paul Getty Museum. Emergency planning handbook. Malibu: J. Paul Getty Museum, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Museum, Royal Ontario. Disaster plan. [Toronto, Ont: The Museum, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Blakley, Robert, and Bob Blakley. CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series). Addison Wesley Longman, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

A focus on object-oriented technology: Experiences & outlooks. [S.l.]: Information Management Forum, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Thuraisingham, Bhavani M. Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, (Workshops in Computing). Springer, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Workshop on Security for Object-Oriented Systems, R. Sandhu, and B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Stuart, Casey-Maslen, Clapham Andrew, Giacca Gilles, and Parker Sarah. Art.1 Object and Purpose. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198723523.003.0005.

Full text
Abstract:
This chapter examines Article 1 of theATT, which sets out the objectives and purpose of the ATT. The provision is divided into two parts, the first of which outlines the ‘object’ of the treaty, while the second part summarizes the ATT’s ‘purpose’. Article 1 sets the ‘highest possible common international standards’ for regulating the international trade in conventional arms; preventing and eradicating illicit trade and preventing diversion are stipulated as the treaty’s object. The purpose of the ATT is to contribute to international and regional peace, security, and stability; reduce human suffering; and promote co-operation, transparency, and responsible action by states parties in international trade in conventional arms, thereby ‘building confidence’ among them.
APA, Harvard, Vancouver, ISO, and other styles
39

Miller, J., C. Casanave, G. Hollowell, D. Patel, and J. Sutherland. Business Object Design and Implementation: OOPSLA'95 Workshop Proceedings. Springer-Verlag Telos, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Buzan, Barry, and Lene Hansen. Defining–Redefining Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.382.

Full text
Abstract:
International security studies (ISS) has significantly evolved from its founding core of “golden age” strategic studies. From the onset of the Cold War in the late 1940s through to the 1970s, strategic studies virtually was ISS, and remains a very large part of it. The fact that it continues to stand as the “mainstream” attacked by widening/deepening approaches further speaks to its status as a “core.” This core consists of those literatures whose principal concern is external military threats to the state, and the whole agenda of the use of force which arises from that. This core was originally focused on nuclear weapons and the military-political rivalry between the US and the Soviet Union, but has since adapted its focus to changes in the salience and nature of military threats caused by the end of the Cold War and 9/11. It includes literatures on deterrence, arms racing, arms control and disarmament, grand strategy, wars (and “new wars”), the use of force, nuclear proliferation, military technology, and terrorism. Debates within ISS are structured, either implicitly or explicitly, by five questions: (1) which referent object to adopt, (2) whether to understand security as internally or externally driven, (3) whether to limit it to the military sector or to expand it, (4) what fundamental thinking about (international) politics to adopt, and (5) which epistemology and methodology to choose.
APA, Harvard, Vancouver, ISO, and other styles
41

Workshop on Security for Object-Oriented Systems, J. Miller, Jeffrey Victor Sutherland, and D. Patel. Business Object Design and Implementation: Oopsla '96, Oopsla '97, and Oopsla '98 Workshop Proceedings. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Non-Imaging Millimeter and Microwave-Wave Sensors for Concealed Object Detection. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Advances in mobile agents systems research: Theory and applications, a framework for mobile agent systems, separation of concerns in mobile object programs, supporting mobility and concurrency, a secure agent framework environment for telecommunication ... Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

A, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

A, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

O'Halloran, Barbara Collopy. Creature Comforts: People and Their Security Objects. Houghton Mifflin, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

1952-, Belsky Jay, and Nezworski Teresa, eds. Clinical implications of attachment. Hillsdale, N.J: L. Erlbaum Associates, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Berry, Joy Wilt. Teach Me About Security Objects (Teach Me About Books). Children's Press (CT), 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Davé, Shilpa S. “Running from the Joint”. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037405.003.0007.

Full text
Abstract:
This chapter examines how the sequel film Harold and Kumar Escape from Guantanamo Bay (2008) establishes Harold and Kumar as patriotic, racialized American citizens who are able to question American federal policy towards outsiders and regional stereotypes in the south in a post-9/11 heightened-security era. Harold and Kumar become the characters that the audience roots for. As in the first film, an Indian accent is not a performative characteristic or object. What is notable is that Harold and Kumar are “accent-less,” so their racial position does not define them. They do not act as cultural objects. In the world of the second film, however, government officials focus on what they look like—they are made hypervisible and seen only as a potential threat to the nation. In contrast to narrative of the paranoid security officials, the rest of the film minimizes their racial threat by having everyone else misrecognize them or surrounds them with exaggerated stereotypes that make Harold and Kumar normative and patriotic. The film allows Kumar, the victim of racial profiling, to protest his treatment and through humor diffuse some of the tension about issues related to detainment and racial profiling.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography