Books on the topic 'Security subject'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security subject.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Canadian Institute for International Peace and Security. Information Services. Peace and security thesaurus. Ottawa: The Institute, 1989.
Find full textThe ethical subject of security: Geopolitical reason and the threat against Europe. Milton Park, Abingdon, Oxon, [England]: Routledge, 2011.
Find full textCameron, Robin. Subjects of Security. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137274366.
Full textSmith, Evan. Race, gender and the body in British immigration control: Subject to examination. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2014.
Find full textStormorken, Bjørn. Human rights terminology in international law: A thesaurus. Dordrecht: M. Nijhoff, 1988.
Find full textUnited States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.
Find full textUnited States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcomittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.
Find full textUnited States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.
Find full textLittke, Grant. Subjects of security: Community, identity, and the dynamics of ethnic conflict. Toronto, Ont: Centre for International and Strategic Studies, York University, 1993.
Find full textUnited States. Congress. House. A bill to amend title XVIII of the Social Security Act to prevent overpayment for hospital discharges to post-acute care services by eliminating the limitation on the number of diagnosis-related groups (DRGs) subject to the special transfer policy. Washington, D.C: United States Government Printing Office, 1999.
Find full textSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textAssembly, Canada Legislature Legislative. Bill: An act for more effectually securing the liberty of the subject. Quebec: Hunter, Rose & Lemieux, 2003.
Find full textYakimova, Vilena, Svetlana Pankova, and Sergey Khmura. Development of the financial control system of foreign economic activity of organizations. ru: Publishing Center RIOR, 2021. http://dx.doi.org/10.29039/02068-5.
Full textFedotova, Yuliya. Administrative and legal protection of the rights and legitimate interests of citizens in the field of defense and security of the Russian Federation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1111367.
Full textWomen, New Jersey Legislature General Assembly Advisory Council on. Public meeting of Assembly Advisory Council on Women: Testimony on issues relating to the safety of children, including Internet use which is the subject of P.L. 1998, c. 126; issues involving criminal invasion of children's privacy, and related matters : [December 4, 2000, Trenton, New Jersey]. Trenton, N.J: The Unit, 2000.
Find full textFedotova, Elena. Computer science. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1200564.
Full textAnna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. New York: Continuum, 2009.
Find full textBurgess, J. Peter. The Ethical Subject of Security. Routledge, 2011. http://dx.doi.org/10.4324/9780203828946.
Full textOrganisation, Export Control, ed. List of goods subject to security export control September 1991. London: Department of Trade and Industry, 1991.
Find full textHekman, Susan J. Feminine Subject. Polity Press, 2014.
Find full textAuthor, title, & subject index to the Social Security Bulletin, 1980-97. Washington, DC: Social Security Administration, Office of Research, Evaluation, and Statistics, 1998.
Find full textA, Marbray Phyllis, United States. Social Security Administration., and United States. Social Security Administration. Office of Research and Statistics., eds. Author, title, and subject index to the Social Security Bulletin, 1980-88. Washington, D.C: U.S. Dept. of Health and Human Services, Social Security Administration, 1989.
Find full textThe feminine subject. Polity, 2014.
Find full textThe Vulnerable Subject Beyond Rationalism In International Relations. Palgrave MacMillan, 2012.
Find full textA, Marbray Phyllis, United States. Social Security Administration., and United States. Social Security Administration. Office of Research and Statistics., eds. Author, title, and subject index to the Social Security Bulletin, 1980-88. Washington, D.C: U.S. Dept. of Health and Human Services, Social Security Administration, 1989.
Find full textMediating Security: Comprehensive Approaches to an Ambiguous Subject - Festschrift for Otmar Hoell. Lang GmbH, Internationaler Verlag der Wissenschaften, Peter, 2013.
Find full textPospisil, Jan, and Alexander Klimburg. Mediating Security: Comprehensive Approaches to an Ambiguous Subject - Festschrift for Otmar Hoell. Lang GmbH, Internationaler Verlag der Wissenschaften, Peter, 2013.
Find full textHayes, Anna. Human (In)Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.32.
Full textButt, Ahsan I. Secession and Security. Cornell University Press, 2017. http://dx.doi.org/10.7591/cornell/9781501713941.001.0001.
Full textSime, Stuart. 26. Security for costs. Oxford University Press, 2016. http://dx.doi.org/10.1093/he/9780198747673.003.3123.
Full textSime, Stuart. 26. Security for Costs. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198823100.003.3123.
Full textSime, Stuart. 26. Security for costs. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787570.003.3123.
Full textGray, Kevin, and Susan Francis Gray. 6. Security interests in land. Oxford University Press, 2013. http://dx.doi.org/10.1093/he/9780199603794.003.0006.
Full textEileen, Denza. Exemption from Social Security Provisions. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0037.
Full textHugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. The Law of Security and Title-Based Financing. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.001.0001.
Full textTrevor C, Hartley. Part I General and Introductory, 5 Subject-Matter Scope: Specific Exclusions. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780198729006.003.0005.
Full textHugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. Part II Description of Interests, 6 Non-Possessory Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.003.0006.
Full textSubjects of Security New Security Challenges. Palgrave Macmillan, 2013.
Find full textFröhlich, Manuel, and Abiodun Williams, eds. The UN Secretary-General and the Security Council. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198748915.001.0001.
Full textChris, Trelawny. 5 The IMO: Maritime Security: An Essential Feature for Sustainable Maritime Development and Global Ocean Governance. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198823957.003.0005.
Full textHugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. Part IV Priorities, 16 Priority Between Consensual and Non-Consensual Security Interests. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.003.0016.
Full textGOVERNMENT, US. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, ... Congress, second session, September 28, 1994. For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 1994.
Find full textStormorken, Bjorn, and Leo Zwaak. Human Rights Terminology in International Law: A Thesaurus. Kluwer Law International, 1988.
Find full textWathen, Thomas W. Security Subjects: A Primer for Protection Officers. Guardian Security Publications, 1987.
Find full textSecurity Subjects: A Primer for Protection Officers. Guardian Security Pubns, 1987.
Find full textSpyridon V, Bazinas. Ch.4— The Geneva Securities Convention and UNCITRAL Texts on Secured Transactions Compared. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0004.
Full textThomas, Keijser. Ch.1— The Best Rules for Non-Intermediated Securities. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0001.
Full textThomas, Keijser, Morton Guy, and Peeters Marcel. Ch.2— Financial Collateral: From Private to Regulatory Law Reform. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0002.
Full textGray, Kevin, and Susan Francis Gray. Land Law. Oxford University Press, 2013. http://dx.doi.org/10.1093/he/9780199603794.001.0001.
Full textThomas, Keijser, ed. General Update. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0005.
Full text