Littérature scientifique sur le sujet « Security state »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security state ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Security state"

1

Hama, Hawre Hasan. « State Security, Societal Security, and Human Security ». Jadavpur Journal of International Relations 21, no 1 (juin 2017) : 1–19. http://dx.doi.org/10.1177/0973598417706591.

Texte intégral
Résumé :
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article critically reviews the traditional approaches of security, the Copenhagen School, the Welsh School, and the human security approach. This article finally argues that the Copenhagen School could successfully broaden the concept of security, and therefore, it is more convincing when compared to other schools.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Aziz, Sahar. « State Sponsored Radicalization ». Michigan Journal of Race & ; Law, no 27.1 (2021) : 125. http://dx.doi.org/10.36643/mjrl.27.1.state.

Texte intégral
Résumé :
Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from breaching the Capitol perimeter. Yet when the day came, the mob of pro-Trump extremists seemed to catch law enforcement by surprise. They seized the Capitol, ransacked congress members’ offices, and openly posted photos of their destruction and their weapons online. In the preceding two decades, the U.S. government has poured money into a behemoth national security apparatus. The FBI’s annual budget ballooned from $3 billion in 1999 to nearly $10 billion today. Much of this 300% increase went to countering terrorism with a mandate to surveil, investigate, and prosecute “homegrown terrorists.” In no uncertain terms, the directive was for the FBI to target Muslim communities.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Oghuvbu, Ejiroghene Augustine. « Security And The Challenges Of Securing Nigerian State ». Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no 3 (10 avril 2021) : 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.

Texte intégral
Résumé :
Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and threaten the very existence of Nigeria as a federation. Against this backdrop, this paper therefore attempts to identify some of the emerging trends of security challenges in Nigeria with a view to diagnosing their causes and examining their implications on the corporate existence of Nigeria. This paper adopted the analytical method and relied on the natural theory of state to posit that the solution to the disturbing trend of security challenges in Nigeria is employment generation and genuine implementation of poverty alleviation programmes in the polity
Styles APA, Harvard, Vancouver, ISO, etc.
4

Blakyta, Ganna, et Tetiana Ganushchak. « Enterprise financial security as a component of the economic security of the state ». Investment Management and Financial Innovations 15, no 2 (14 juin 2018) : 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.

Texte intégral
Résumé :
The article deals with problems of economic and financial security ensuring both in companies and state. The Corruption Perceptions Index has been analyzed as one of the most important indicators in this sphere. The following research methods have been used: generalizing theoretical knowledge, comparison method, method of analysis and synthesis, statistical analysis, factual analysis. The authors give their own definitions to such concepts as “security”, “financial security of the enterprise”, “economic security of the enterprise”. There have been also systemized the threats to the economic security of the enterprise, as well as means of its strengthening. The rating of Ukraine according to the Corruption Perceptions Index has been identified. Also, the perspectives of future research have been defined.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Onyshchenko, Svitlana. « State Budgetary Security Determinants ». ЕКОНОМІКА І РЕГІОН Науковий вісник, no 4(75) (27 décembre 2019) : 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.

Texte intégral
Résumé :
Бюджетна безпека держави обумовлюється низкою детермінантів, які визначають зміст, структуру та рівень її забезпечення. Визначено, що визначальними фактами забезпечення державного бюджету є фактори, загрози як екзогенного, так і ендогенного походження, а також причинно-наслідкові зв’язки, які прямо чи опосередковано визначають його рівень та складність процесів його забезпечення.Запропоновано перелік основних детермінант, що впливають на забезпечення бюджетної безпеки держави з урахуванням процесів глобалізації, конструктивного / руйнівного впливу факторів та загроз. Зазначається, що систематичним елементом забезпечення державного бюджету є державний бюджет, який є багатогранним поняттям. Бюджет як інструмент державної політики відіграє ключову роль у забезпеченні соціально-економічного розвитку держави, реалізації її національних інтересів, а саме на обсяг та структуру дохідної та видаткової частини бюджету впливають на функціонування всіх галузей економіка.Обґрунтовується необхідність забезпечення бюджетної безпеки як складової соціально-економічного розвитку та передумовою здійснення ефективної державної фінансово-економічної політики як основи досягнення національних економічних інтересів держави.Систематизовано основні детермінанти впливу на бюджетну безпеку держави з урахуванням глобалізаційних процесів та багатокритерії існуючих факторів та загроз як екзогенного, так і ендогенного походження.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ganguly, Sumit. « The Troublesome Security State ». Journal of Democracy 28, no 3 (2017) : 117–26. http://dx.doi.org/10.1353/jod.2017.0050.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Collins, Alan. « State-Induced Security Dilemma ». Cooperation and Conflict 39, no 1 (mars 2004) : 27–44. http://dx.doi.org/10.1177/0010836704040833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kudelia, Serhiy. « Ukraine's Emerging Security State ». Current History 117, no 801 (1 octobre 2018) : 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Chandramouli, Ramaswamy, et Peter Mell. « State of security readiness ». XRDS : Crossroads, The ACM Magazine for Students 16, no 3 (mars 2010) : 23–25. http://dx.doi.org/10.1145/1734160.1734168.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Nelson, Cary. « The National Security State ». Cultural Studies ↔ Critical Methodologies 4, no 3 (août 2004) : 357–61. http://dx.doi.org/10.1177/1532708603262788.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Security state"

1

Frisk, Ulf, et Semir Drocic. « The State of Home Computer Security ». Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Texte intégral
Résumé :

Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.

This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.

Styles APA, Harvard, Vancouver, ISO, etc.
2

Majumdar, Ankur. « Security in power system state estimation ». Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Texte intégral
Résumé :
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a common task in unbalanced distribution systems due to the difference in design and operation philosophy. This thesis addresses these issues and investigates the distribution system state estimation with unbalanced full three-phase modelling. The formulation, based on weighted least squares estimation, is extended to include the open/closed switches as equality constraints. This research then explores the vulnerabilities of the state estimation problem against attacks associated with leverage measurements. Detecting gross error particularly for leverage measurements have been found to be difficult due to low residuals. The thesis presents and discusses the suitability of externally studentized residuals compared to traditional residual techniques. Additionally, the masking/swamping phenomenon associated with multiple leverages makes the identification of gross error even more difficult. This thesis proposes a robust method of identifying the high leverages and then detecting gross error when the leverage measurements are compromised. All algorithms are validated in different IEEE test systems.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rockett, Jan P. « Internal security in a democratic state ». Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fitzgerald, Alan. « DATA SECURITY IN SOLID STATE DISKS ». International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Texte intégral
Résumé :
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada
Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gordon, Ellen M. « Multi-state initiatives : agriculture security preparedness ». Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Texte intégral
Résumé :
CHDS State/Local
Approved for public release, distribution is unlimited
To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Federal government to address these issues are limited and overextended. If states attempt to address this threat independently, important opportunities to reduce vulnerability and enhance capability will be lost. To achieve the capabilities needed for agro terrorism detection, mitigation, preparedness and response, states must collaborate to build the partnerships and programs their citizens require. This thesis argues multi-state partnerships are critical to defeating this threat as well as providing a robust response to an attack. Whether intentionally introduced or naturally occurring , infectious diseases can easily cross state borders before an outbreak is even detected. States must be prepared to act quickly to mitigate the effects of any crisis. There is a significant opportunity for states to strengthen their abilities to provide for a stronger agriculture counter terrorism preparedness system. The states can further their ability to combat attacks on agriculture actively by demonstrating leadership in implementing administrative agreements and ultimately adopting compact(s) between states as well as with the private sector.
Civilian, Homeland Security Advisor and Emergency Management Administrator, Iowa Homeland Security and Emergency Management Division
Styles APA, Harvard, Vancouver, ISO, etc.
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). « Multi-state initiatives--agriculture security preparedness / ». Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Woodbury, Glen L. « Recommendations for Homeland Security Organizational approaches at the State Government level ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Shamkalo, K. Yu. « Stock market’s security in the context of strengthening the state financial security ». Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Texte intégral
Résumé :
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusions are drawn about the impact of trends in stock indices and international ratings of investment attractiveness on the financial security of Ukraine from the side of investor profitability.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Blackwood, Matthew J. « Homeland security within state departments of agriculture : components of an effective security program ». Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Texte intégral
Résumé :
CHDS State/Local
Approved for public release; distribution is unlimited
ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure as success factors in building successful homeland security programs. This research found that lack of information sharing, a disconnect between the federal and state government, and inadequate funding created barriers to the implementation of constructive homeland security programs. To better position the homeland security programs within state departments of agriculture, this research provides several recommendations. Given the diversity of the roles and responsibilities in agriculture agencies, it is not possible to develop a model program for every state. These recommendations identify components of a model program that agencies could selectively use to enhance the effectiveness of homeland security programs.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fugere, Charles. « Muslims, National Security and the State in Uzbekistan ». Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Texte intégral
Résumé :
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations: 1) it is unlikely that Muslims are able to present a national security risk and 2) there are reasons to suspect that the national security policies of the Uzbek leadership target Islamic fundamentalism at least in part to legitimize the continued repression of most types of opposition.
L'existence d'une "menace islamique" à la sécurité nationale de l'Ouzbékistan est une idée répandue dans les médias et chez certains spécialistes. Le régime du Président ouzbek Islam Karimov a souligné cette menace à plusieurs reprises et a agi en conséquence. J'examine à la fois la capacité actuelle de différents groupes musulmans à défier les mécanismes de défense de l'état, ainsi que des éléments d'histoire récente de la stratégie de sécurité nationale ouzbèke liés à l'Islam. L'argument présenté est que la relation entre les musulmans et la sécurité nationale en Ouzbékistan est caractérisée par les deux observations suivantes: 1) il est peu probable que les musulmans soient capables de poser un risque à la sécurité nationale et 2) il existe des raisons de suspecter que les politiques de sécurité nationale du gouvernment s'attaquent à l'intégrisme musulman au moins en partie dans le but de légitimiser la répression continue de la majorité des forces d'opposition.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Security state"

1

Hong, Yong-Pyo. State Security and Regime Security. London : Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Omand, David. Securing the state : National security in contemporary times. Singapore : S. Rajaratnam School of International Studies, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

S. Rajaratnam School of International Studies, dir. Securing the state : National security in contemporary times. Singapore : S. Rajaratnam School of International Studies, Nanyang Technological University, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Cañas, Dick. HOMELAND SECURITY AT THE STATE LEVEL : A Primer on State Homeland Security Programs. Bloomington, IN : authorHOUSE, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Baxter, John. State security, privacy and information. New York : Harvester Wheatsheaf, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Anna, Yeatman, et Żółkoś Magdalena, dir. State, security, and subject formation. New York : Continuum, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

D, Baxter John. State security, privacy, and information. New York : St. Martin's Press, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

author, Kotwal Navaz, et Commonwealth Human Rights Initiative, dir. State security commissions : Reform derailed. New Delhi : Commonwealth Human Rights Initiative, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Baxter, John. State security, privacy and information. Hemel Hempstead : Harvester Wheatsheaf, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Williams, Michael C. (Michael Charles), 1960-, dir. Security beyond the state : Private security in international politics. Cambridge : Cambridge University Press, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Security state"

1

Regilme, Salvador Santino F., et Beate Beller. « Security State ». Dans The Palgrave Encyclopedia of Global Security Studies, 1–5. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_126-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Paul, Erik. « Security State ». Dans Australia as US Client State, 30–50. London : Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137469359_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Barnett, Hilaire. « State Security ». Dans Constitutional & ; Administrative Law, 536–73. Twelfth edition. | Abingdon, Oxon [UK] ; New York : Routledge, 2017. : Routledge, 2017. http://dx.doi.org/10.4324/9781315458373-27.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Barnett, Hilaire. « State Security ». Dans Constitutional & ; Administrative Law, 513–50. 13th edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2019. : Routledge, 2019. http://dx.doi.org/10.4324/9780429322686-22.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Regilme, Salvador Santino F., et Beate Beller. « Security State ». Dans The Palgrave Encyclopedia of Global Security Studies, 1328–32. Cham : Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_126.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Romero, Vidal. « Security ». Dans Rebuilding the State Institutions, 107–22. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31314-2_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kettunen, Pauli. « Welfare state, competition state, security state ». Dans Remapping Security on Europe’s Northern Borders, 201–20. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2021. : Routledge, 2021. http://dx.doi.org/10.4324/9781003096412-14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fraser, Trudy. « Human Security as State Security ». Dans Maintaining Peace and Security ?, 186–214. London : Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-03215-7_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Heylen, Evelyn, Steven De Boeck, Marten Ovaere, Hakan Ergun et Dirk Van Hertem. « Steady-State Security ». Dans Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems, 21–40. Chichester, UK : John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.ch2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Lekunze, Manu. « Modern state security ». Dans Complex Adaptive Systems, Resilience and Security in Cameroon, 72–90. New York, NY : Routledge, 2019. | Series : Routledge contemporary Africa series : Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Security state"

1

Bodden, Eric. « State of the systems security ». Dans ICSE '18 : 40th International Conference on Software Engineering. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3183440.3183462.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Frey, Michael R., et Jaclyn D. Szymonifka. « A Gaussian quantum state discriminator ». Dans Defense and Security, sous la direction de Eric J. Donkor, Andrew R. Pirich et Howard E. Brandt. SPIE, 2005. http://dx.doi.org/10.1117/12.604340.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Simonaitis-Castillo, Vida K. « State of the art of crystal growth in the United States ». Dans SPIE Defense, Security, and Sensing, sous la direction de Mark Dubinskii et Stephen G. Post. SPIE, 2010. http://dx.doi.org/10.1117/12.849223.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Grunnan, Tonje, Monica Endregard, Ragnhild E. Siedler et Ann-Kristin Elstad. « Norwegian Societal Security and State Security – Challenges and Dilemmas ». Dans Proceedings of the 29th European Safety and Reliability Conference (ESREL). Singapore : Research Publishing Services, 2020. http://dx.doi.org/10.3850/978-981-14-8593-0_4467-cd.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Heremans, Joseph P. « Introduction to cryogenic solid state cooling ». Dans SPIE Defense + Security, sous la direction de Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich et Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2228756.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Suh, DongHyok, et Young-Hwan Oh. « Crime Prevention Using Individual’s State Estimation ». Dans Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.73.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Sendobry, Alexander, Thorsten Graber et Uwe Klingauf. « Purely optical navigation with model-based state prediction ». Dans Security + Defence, sous la direction de Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864686.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wagner, Matthias, Eugene Ma, John Heanue et Shuyun Wu. « Solid state optical thermal imagers ». Dans Defense and Security Symposium, sous la direction de Bjørn F. Andresen, Gabor F. Fulop et Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.730274.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Frey, Michael R. « A quantum state discrimination martingale ». Dans Defense and Security Symposium, sous la direction de Eric J. Donkor, Andrew R. Pirich et Howard E. Brandt. SPIE, 2007. http://dx.doi.org/10.1117/12.717679.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Butkova, O. V. « THE MAIN DIRECTIONS OF IMPROVING THE FINANCIAL SECURITY OF AGRICULTURAL ENTERPRISES ». Dans STATE AND DEVELOPMENT PROSPECTS OF AGRIBUSINESS. DSTU-PRINT, 2020. http://dx.doi.org/10.23947/interagro.2020.1.63-66.

Texte intégral
Résumé :
The article presents the results of a study of the financial security of agricultural enterprises. The concept of financial security of an economic entity is given. The essence of the financial security of the enterprise and its relationship with the economic security of the enterprise is determined. The main problems in achieving financial security that are characteristic of most agricultural enterprises in the south of the Rostov region are identified, and ways to address them are outlined.
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Security state"

1

Jablonsky, David. The State of the National Security State. Fort Belvoir, VA : Defense Technical Information Center, novembre 2002. http://dx.doi.org/10.21236/ada408224.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Jablonsky, David. The State of the National Security State. Fort Belvoir, VA : Defense Technical Information Center, novembre 2002. http://dx.doi.org/10.21236/ada408437.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Feng, Shaw C., et Simon P. Frechette. The state of container security standards. Gaithersburg, MD : National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7153.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Chow, William. Fixing the Broken State of Mobile Security. Denmark : River Publishers, août 2016. http://dx.doi.org/10.13052/popcas009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Marcella, Gabriel. Affairs of State : The Interagency and National Security. Fort Belvoir, VA : Defense Technical Information Center, décembre 2008. http://dx.doi.org/10.21236/ada491602.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Mikaelsen, Dallas P. U.S.-Brazil Security Cooperation and the State Partnership Program. Fort Belvoir, VA : Defense Technical Information Center, juin 2015. http://dx.doi.org/10.21236/ad1012803.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Busch, Oberst G. German-Israeli Relations : Security of Israel--Reason of State ? Fort Belvoir, VA : Defense Technical Information Center, mars 2013. http://dx.doi.org/10.21236/ada589061.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Tulak, Arthur N., R. W. Kraft et Don Silbaugh. State Defense Forces : Forces for NORTHCOM and Homeland Security ? Fort Belvoir, VA : Defense Technical Information Center, mars 2003. http://dx.doi.org/10.21236/ada421654.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Goertzel, Karen M., Theodore Winograd, Holly L. McKinley, Lyndon J. Oh, Michael Colon, Thomas McGibbon, Elaine Fedchak et Robert Vienneau. Software Security Assurance : A State-of-Art Report (SAR). Fort Belvoir, VA : Defense Technical Information Center, juillet 2007. http://dx.doi.org/10.21236/ada472363.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Obado-Joel, Jennifer. The Challenge of State-Backed Internal Security in Nigeria : Considerations for Amotekun. RESOLVE Network, décembre 2020. http://dx.doi.org/10.37805/pn2020.9.ssa.

Texte intégral
Résumé :
Nigeria faces immense internal security challenges, including the Boko-Haram crisis in the northeast and violent farmer-herder conflicts in the southwest and north-central states. Across the Nigerian federation, pockets of violent clashes have sprung and escalated in new locales in the last decade. Community responses to these violent crises have been diverse and included the establishment of armed groups to supplement or act in parallel to the security efforts of the Nigerian state—in some cases with backing from federal or state governments. These local security assemblages, community-based armed groups (CBAGs), are on the one hand contributors to local order, and normative conceptions of peace and security. On the other hand, these groups are often a pernicious actor within the broader security landscape, undermining intercommunal peace and drivers of violence and human rights abuses. This Policy Note focuses on the characteristics, challenges, and opportunities of Amotekun, a recently formed CBAG in Southwest Nigeria. Drawing from the experiences of similar Nigerian groups, the Note details recommendations that may facilitate greater success and lessen poten al risk associated with Amotekun’s formation. These recommendations are aimed primarily at Nigerian government and civil society actors and describe areas where external support could potentially improve local capacity to conduct oversight of Amotekun and similar groups.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie