Articoli di riviste sul tema "Security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Kumar, Ashok. "Securing the security". City 18, n. 3 (4 maggio 2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Testo completoNadler, Jerrold. "Securing social security". Washington Quarterly 22, n. 1 (marzo 1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Testo completoPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions". University of Michigan Journal of Law Reform, n. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Testo completoAl-Fedaghi, Sabah. "Securing the Security System". International Journal of Security and Its Applications 11, n. 3 (31 marzo 2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Testo completoBrandon, William P., e Zachary Mohr. "Securing Social Security Solvency". Politics and the Life Sciences 38, n. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Testo completoNissenbaum, Helen. "Where Computer Security Meets National Security1". Ethics and Information Technology 7, n. 2 (giugno 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Testo completoKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security". Australian Journal of International Affairs 72, n. 6 (15 ottobre 2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Testo completoMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse". Cultural Values 3, n. 3 (luglio 1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Testo completoWright, J. "Security? What security? [job security]". Engineering & Technology 4, n. 3 (14 febbraio 2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Testo completoEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, n. 3 (settembre 2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Testo completoTOMÁŠEK, Martin. "Security Properties Verification of Security Protocols". Acta Electrotechnica et Informatica 14, n. 2 (1 giugno 2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.
Testo completoMuhammad Jamshid Khan. "Securing network infrastructure with cyber security". World Journal of Advanced Research and Reviews 17, n. 2 (28 febbraio 2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Testo completoHama, Hawre Hasan. "State Security, Societal Security, and Human Security". Jadavpur Journal of International Relations 21, n. 1 (giugno 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Testo completoNeamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security". International Journal of Psychosocial Rehabilitation 24, n. 5 (20 aprile 2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.
Testo completoKharb, Latika, e Deepak Chahal. "Cloud Access Security Brokers: Strengthening Cloud Security". International Journal of Research Publication and Reviews 4, n. 8 (agosto 2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.
Testo completoDynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler". National Security Journal 1, n. 1 (ottobre 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.
Testo completoWEBER, CYNTHIA, e MARK LACY. "Securing by design". Review of International Studies 37, n. 3 (1 marzo 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Testo completoClough, Patricia Ticineto, e Craig Willse. "Gendered Security/National Security". Social Text 28, n. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.
Testo completoElliott, Lorraine. "Human security/environmental security". Contemporary Politics 21, n. 1 (2 gennaio 2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.
Testo completoPasquinucci, Andrea. "Defeating security with security". Computer Fraud & Security 2008, n. 2 (febbraio 2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.
Testo completoKeeley, James F. "Review: Security: Writing Security". International Journal: Canada's Journal of Global Policy Analysis 48, n. 3 (settembre 1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.
Testo completoHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN". Badamai Law Journal 1, n. 2 (1 settembre 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Testo completoOthman, Sadeq. "Securing Robotic Communication using Multiple Security Techniques". International Journal of Computer Applications 178, n. 1 (15 novembre 2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.
Testo completoAntonius, Rachad, Micheline Labelle e François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, n. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Testo completoRomero Ortiz, María Elena, e Carlos Uscanga Prieto. "Japan: Securing Cooperation or Cooperating to Security?" México y la Cuenca del Pacífico 5, n. 14 (1 maggio 2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.
Testo completoSingh, Ritesh, Lalit Kumar, Debraj Banik e S. Sundar. "Smart security and securing data through watermarking". IOP Conference Series: Materials Science and Engineering 263 (novembre 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.
Testo completoShin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality". Journal of International Politics 15, n. 1 (31 marzo 2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.
Testo completoRushton, Simon. "Global Health Security: Security for whom? Security from what?" Political Studies 59, n. 4 (7 novembre 2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.
Testo completoG, Anusha. "Cyber Security". International Journal of Research Publication and Reviews 4, n. 4 (aprile 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.
Testo completoManoj Thakur Neha, Rajani. "Cyber Security". International Journal of Science and Research (IJSR) 13, n. 1 (5 gennaio 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.
Testo completoToka, K. O., Y. Dikilitaş, T. Oktay e A. Sayar. "SECURING IOT WITH BLOCKCHAIN". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23 dicembre 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Testo completoKyung-Im Cho. "Security Deposit as Collateral Security". Korean Lawyers Association Journal 64, n. 12 (dicembre 2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.
Testo completoHOFREITER, Ladislav. "SECURITY CULTURE AND SECURITY MANAGEMENT". Krízový Manažment 14, n. 2 (30 settembre 2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.
Testo completoINTRILIGATOR, MICHAEL D. "GLOBAL SECURITY AND HUMAN SECURITY". International Journal of Development and Conflict 01, n. 01 (aprile 2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.
Testo completoJohansen, Robert C. "Real Security is Democratic Security". Alternatives: Global, Local, Political 16, n. 2 (aprile 1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.
Testo completoMalcolmson, Robert W. "Review: International Security: Alternative Security". International Journal: Canada's Journal of Global Policy Analysis 46, n. 4 (dicembre 1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.
Testo completoCohen, Fred. "Strategic Security Intelligence — Embedded Security". Network Security 2002, n. 2 (febbraio 2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.
Testo completoLeach, Dr John. "Security engineering and security RoI". Computers & Security 22, n. 6 (settembre 2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.
Testo completoMeyer, Helen. "Security risk or security solution?" Computers & Security 15, n. 4 (gennaio 1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Testo completoSØRENSEN, GEORG. "Individual Security and National Security". Security Dialogue 27, n. 4 (dicembre 1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.
Testo completoTrzciński, Łukasz, e Juliusz Piwowarski. "Security culture and security anthropology". Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, n. 33 (29 marzo 2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.
Testo completoStosic, Lazar, e Dragan Velickovic. "Computer security and security technologies". Journal of Process Management. New Technologies 1, n. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Testo completoFekete, Liz. "Peoples' Security Versus National Security". Race & Class 44, n. 3 (gennaio 2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.
Testo completoPerlmutter, Amos, e Benjamin Frankel. "SECURITY STUDIES and Security Studies". Security Studies 1, n. 1 (settembre 1991): iv. http://dx.doi.org/10.1080/09636419109347452.
Testo completoSoneji, Samir, e Gary King. "Statistical Security for Social Security". Demography 49, n. 3 (17 maggio 2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.
Testo completoAlkunidry, Dona, Shahad Alhuwaysi e Rawan Alharbi. "Security Threads and IoT Security". Journal of Computer and Communications 11, n. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Testo completoSharma, Suman, Yogesh Verma e Amit Nadda. "Information Security Cyber Security Challenges". International Journal of Scientific Research in Computer Science and Engineering 7, n. 1 (28 febbraio 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Testo completoChun, Woong. "National Security and Human Security". Korean Journal of International Relations 44, n. 1 (30 aprile 2004): 25–49. http://dx.doi.org/10.14731/kjir.2004.04.44.1.25.
Testo completoSmith, Donna B., e Assistant. "National Security Archive9971National Security Archive. National Security Archive. National Security Archive, URL: www.seas.gwu.edu/nsarchive". Electronic Resources Review 3, n. 7 (luglio 1999): 77–78. http://dx.doi.org/10.1108/err.1999.3.7.77.71.
Testo completoShakir, Taif Khalid, Rabah Scharif e Manal M. Nasir. "A Proposed Blockchain based System for Secure Data Management of Computer Networks". Journal of Cybersecurity and Information Management 11, n. 2 (2023): 36–46. http://dx.doi.org/10.54216/jcim.110204.
Testo completo