Academic literature on the topic 'Security state'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security state.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security state"
Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Full textAziz, Sahar. "State Sponsored Radicalization." Michigan Journal of Race & Law, no. 27.1 (2021): 125. http://dx.doi.org/10.36643/mjrl.27.1.state.
Full textOghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.
Full textBlakyta, Ganna, and Tetiana Ganushchak. "Enterprise financial security as a component of the economic security of the state." Investment Management and Financial Innovations 15, no. 2 (June 14, 2018): 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.
Full textOnyshchenko, Svitlana. "State Budgetary Security Determinants." ЕКОНОМІКА І РЕГІОН Науковий вісник, no. 4(75) (December 27, 2019): 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.
Full textGanguly, Sumit. "The Troublesome Security State." Journal of Democracy 28, no. 3 (2017): 117–26. http://dx.doi.org/10.1353/jod.2017.0050.
Full textCollins, Alan. "State-Induced Security Dilemma." Cooperation and Conflict 39, no. 1 (March 2004): 27–44. http://dx.doi.org/10.1177/0010836704040833.
Full textKudelia, Serhiy. "Ukraine's Emerging Security State." Current History 117, no. 801 (October 1, 2018): 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.
Full textChandramouli, Ramaswamy, and Peter Mell. "State of security readiness." XRDS: Crossroads, The ACM Magazine for Students 16, no. 3 (March 2010): 23–25. http://dx.doi.org/10.1145/1734160.1734168.
Full textNelson, Cary. "The National Security State." Cultural Studies ↔ Critical Methodologies 4, no. 3 (August 2004): 357–61. http://dx.doi.org/10.1177/1532708603262788.
Full textDissertations / Theses on the topic "Security state"
Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.
Full textHundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.
This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.
Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.
Full textRockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.
Full textFitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.
Full textSolid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.
Full textApproved for public release, distribution is unlimited
To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Federal government to address these issues are limited and overextended. If states attempt to address this threat independently, important opportunities to reduce vulnerability and enhance capability will be lost. To achieve the capabilities needed for agro terrorism detection, mitigation, preparedness and response, states must collaborate to build the partnerships and programs their citizens require. This thesis argues multi-state partnerships are critical to defeating this threat as well as providing a robust response to an attack. Whether intentionally introduced or naturally occurring , infectious diseases can easily cross state borders before an outbreak is even detected. States must be prepared to act quickly to mitigate the effects of any crisis. There is a significant opportunity for states to strengthen their abilities to provide for a stronger agriculture counter terrorism preparedness system. The states can further their ability to combat attacks on agriculture actively by demonstrating leadership in implementing administrative agreements and ultimately adopting compact(s) between states as well as with the private sector.
Civilian, Homeland Security Advisor and Emergency Management Administrator, Iowa Homeland Security and Emergency Management Division
Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.
Full textThesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.
Full textThesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.
Full textBlackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.
Full textApproved for public release; distribution is unlimited
ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure as success factors in building successful homeland security programs. This research found that lack of information sharing, a disconnect between the federal and state government, and inadequate funding created barriers to the implementation of constructive homeland security programs. To better position the homeland security programs within state departments of agriculture, this research provides several recommendations. Given the diversity of the roles and responsibilities in agriculture agencies, it is not possible to develop a model program for every state. These recommendations identify components of a model program that agencies could selectively use to enhance the effectiveness of homeland security programs.
Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.
Full textL'existence d'une "menace islamique" à la sécurité nationale de l'Ouzbékistan est une idée répandue dans les médias et chez certains spécialistes. Le régime du Président ouzbek Islam Karimov a souligné cette menace à plusieurs reprises et a agi en conséquence. J'examine à la fois la capacité actuelle de différents groupes musulmans à défier les mécanismes de défense de l'état, ainsi que des éléments d'histoire récente de la stratégie de sécurité nationale ouzbèke liés à l'Islam. L'argument présenté est que la relation entre les musulmans et la sécurité nationale en Ouzbékistan est caractérisée par les deux observations suivantes: 1) il est peu probable que les musulmans soient capables de poser un risque à la sécurité nationale et 2) il existe des raisons de suspecter que les politiques de sécurité nationale du gouvernment s'attaquent à l'intégrisme musulman au moins en partie dans le but de légitimiser la répression continue de la majorité des forces d'opposition.
Books on the topic "Security state"
Hong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Full textOmand, David. Securing the state: National security in contemporary times. Singapore: S. Rajaratnam School of International Studies, 2012.
Find full textS. Rajaratnam School of International Studies, ed. Securing the state: National security in contemporary times. Singapore: S. Rajaratnam School of International Studies, Nanyang Technological University, 2012.
Find full textCañas, Dick. HOMELAND SECURITY AT THE STATE LEVEL: A Primer on State Homeland Security Programs. Bloomington, IN: authorHOUSE, 2012.
Find full textBaxter, John. State security, privacy and information. New York: Harvester Wheatsheaf, 1990.
Find full textAnna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. New York: Continuum, 2009.
Find full textD, Baxter John. State security, privacy, and information. New York: St. Martin's Press, 1990.
Find full textauthor, Kotwal Navaz, and Commonwealth Human Rights Initiative, eds. State security commissions: Reform derailed. New Delhi: Commonwealth Human Rights Initiative, 2011.
Find full textBaxter, John. State security, privacy and information. Hemel Hempstead: Harvester Wheatsheaf, 1990.
Find full textWilliams, Michael C. (Michael Charles), 1960-, ed. Security beyond the state: Private security in international politics. Cambridge: Cambridge University Press, 2011.
Find full textBook chapters on the topic "Security state"
Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies, 1–5. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_126-1.
Full textPaul, Erik. "Security State." In Australia as US Client State, 30–50. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137469359_4.
Full textBarnett, Hilaire. "State Security." In Constitutional & Administrative Law, 536–73. Twelfth edition. | Abingdon, Oxon [UK] ; New York : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315458373-27.
Full textBarnett, Hilaire. "State Security." In Constitutional & Administrative Law, 513–50. 13th edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429322686-22.
Full textRegilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies, 1328–32. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_126.
Full textRomero, Vidal. "Security." In Rebuilding the State Institutions, 107–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31314-2_6.
Full textKettunen, Pauli. "Welfare state, competition state, security state." In Remapping Security on Europe’s Northern Borders, 201–20. Milton Park, Abingdon, Oxon; New York, NY : Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003096412-14.
Full textFraser, Trudy. "Human Security as State Security." In Maintaining Peace and Security?, 186–214. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-03215-7_8.
Full textHeylen, Evelyn, Steven De Boeck, Marten Ovaere, Hakan Ergun, and Dirk Van Hertem. "Steady-State Security." In Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems, 21–40. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.ch2.
Full textLekunze, Manu. "Modern state security." In Complex Adaptive Systems, Resilience and Security in Cameroon, 72–90. New York, NY : Routledge, 2019. | Series: Routledge contemporary Africa series: Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-5.
Full textConference papers on the topic "Security state"
Bodden, Eric. "State of the systems security." In ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183440.3183462.
Full textFrey, Michael R., and Jaclyn D. Szymonifka. "A Gaussian quantum state discriminator." In Defense and Security, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2005. http://dx.doi.org/10.1117/12.604340.
Full textSimonaitis-Castillo, Vida K. "State of the art of crystal growth in the United States." In SPIE Defense, Security, and Sensing, edited by Mark Dubinskii and Stephen G. Post. SPIE, 2010. http://dx.doi.org/10.1117/12.849223.
Full textGrunnan, Tonje, Monica Endregard, Ragnhild E. Siedler, and Ann-Kristin Elstad. "Norwegian Societal Security and State Security – Challenges and Dilemmas." In Proceedings of the 29th European Safety and Reliability Conference (ESREL). Singapore: Research Publishing Services, 2020. http://dx.doi.org/10.3850/978-981-14-8593-0_4467-cd.
Full textHeremans, Joseph P. "Introduction to cryogenic solid state cooling." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2228756.
Full textSuh, DongHyok, and Young-Hwan Oh. "Crime Prevention Using Individual’s State Estimation." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.73.
Full textSendobry, Alexander, Thorsten Graber, and Uwe Klingauf. "Purely optical navigation with model-based state prediction." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864686.
Full textWagner, Matthias, Eugene Ma, John Heanue, and Shuyun Wu. "Solid state optical thermal imagers." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.730274.
Full textFrey, Michael R. "A quantum state discrimination martingale." In Defense and Security Symposium, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2007. http://dx.doi.org/10.1117/12.717679.
Full textButkova, O. V. "THE MAIN DIRECTIONS OF IMPROVING THE FINANCIAL SECURITY OF AGRICULTURAL ENTERPRISES." In STATE AND DEVELOPMENT PROSPECTS OF AGRIBUSINESS. DSTU-PRINT, 2020. http://dx.doi.org/10.23947/interagro.2020.1.63-66.
Full textReports on the topic "Security state"
Jablonsky, David. The State of the National Security State. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408224.
Full textJablonsky, David. The State of the National Security State. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408437.
Full textFeng, Shaw C., and Simon P. Frechette. The state of container security standards. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7153.
Full textChow, William. Fixing the Broken State of Mobile Security. Denmark: River Publishers, August 2016. http://dx.doi.org/10.13052/popcas009.
Full textMarcella, Gabriel. Affairs of State: The Interagency and National Security. Fort Belvoir, VA: Defense Technical Information Center, December 2008. http://dx.doi.org/10.21236/ada491602.
Full textMikaelsen, Dallas P. U.S.-Brazil Security Cooperation and the State Partnership Program. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ad1012803.
Full textBusch, Oberst G. German-Israeli Relations: Security of Israel--Reason of State? Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada589061.
Full textTulak, Arthur N., R. W. Kraft, and Don Silbaugh. State Defense Forces: Forces for NORTHCOM and Homeland Security? Fort Belvoir, VA: Defense Technical Information Center, March 2003. http://dx.doi.org/10.21236/ada421654.
Full textGoertzel, Karen M., Theodore Winograd, Holly L. McKinley, Lyndon J. Oh, Michael Colon, Thomas McGibbon, Elaine Fedchak, and Robert Vienneau. Software Security Assurance: A State-of-Art Report (SAR). Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada472363.
Full textObado-Joel, Jennifer. The Challenge of State-Backed Internal Security in Nigeria: Considerations for Amotekun. RESOLVE Network, December 2020. http://dx.doi.org/10.37805/pn2020.9.ssa.
Full text