Статті в журналах з теми "Secure Services"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Secure Services.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secure Services".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Exworthy, Tim. "Secure psychiatric services." Current Opinion in Psychiatry 13, no. 6 (November 2000): 581–85. http://dx.doi.org/10.1097/00001504-200011000-00019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Campbell, Andrea. "High secure services." British Journal of Forensic Practice 7, no. 4 (November 2005): 27–32. http://dx.doi.org/10.1108/14636646200500026.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services." International Journal of Electronic Government Research 8, no. 1 (January 2012): 1–25. http://dx.doi.org/10.4018/jegr.2012010101.

Повний текст джерела
Анотація:
E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Beales, D. "Pendulummanagement in secure services." British Journal of Psychiatry 184, no. 3 (March 2004): 270–71. http://dx.doi.org/10.1192/bjp.184.3.270-a.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rahman, Nor Azlina Abd. "A Conceptual Diagram for Secure Virtual Office Services." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1251–60. http://dx.doi.org/10.37200/ijpr/v23i4/pr190451.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Coid, Jeremy, Nadji Kahtan, Simon Gault, Adrian Cook, and Brian Jarman. "Medium secure forensic psychiatry services." British Journal of Psychiatry 178, no. 1 (January 2001): 55–61. http://dx.doi.org/10.1192/bjp.178.1.55.

Повний текст джерела
Анотація:
BackgroundRegional medium secure developments have proceeded unevenly, with wide variations in resources to deliver services.AimsTo compare patients admitted to seven (pre-reorganisation) regional services and styles of service delivery.MethodA record survey of a complete sample of 2608 patients admitted on 3403 occasions between 1 January 1988 and 31 December 1994.ResultsServices differed according to location of patients before admission, their legal basis for detention, criminal and antisocial behaviour, diagnosis, security needs and length of stay. Regions with more resources and lower demand provided a wider range of services. Thames services were relatively under-provided during the study period, with North East Thames substantially reliant on admissions to private hospitals.ConclusionsUncoordinated development led to under-provision despite high demand. Certain regions prioritised offender patients and did not support local psychiatric services. New standards are required for service specification and resource allocation to redress inequality. Traditional performance measures were of limited usefulness in comparing services.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bhargavan, Karthikeyan, Ricardo Corin, Cédric Fournet, and Andrew D. Gordon. "Secure sessions for Web services." ACM Transactions on Information and System Security 10, no. 2 (May 2007): 8. http://dx.doi.org/10.1145/1237500.1237504.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Orakwue, Enuma. "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19, no. 6 (November 23, 2010): 295–98. http://dx.doi.org/10.1080/19393550903482924.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Pinto, António, and Manuel Ricardo. "Secure multicast in IPTV services." Computer Networks 54, no. 10 (July 2010): 1531–42. http://dx.doi.org/10.1016/j.comnet.2009.12.007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.

Повний текст джерела
Анотація:
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Kim, Sung-Ki, Jin-Chul Jung, Kyung-No Park, and Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States." KIPS Transactions:PartC 15C, no. 3 (June 30, 2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Hall, Ian, Evan Yacoub, Neil Boast, Robert Bates, Rebekah Stamps, Sarah Holder, and Matthew Beadman. "Secure inpatient services: a needs assessment." Journal of Intellectual Disabilities and Offending Behaviour 5, no. 1 (March 4, 2014): 38–53. http://dx.doi.org/10.1108/jidob-09-2013-0023.

Повний текст джерела
Анотація:
Purpose – The purpose of this paper is to complete a thorough needs assessment that would enable the development of a robust pathway of care for adults with a learning disability requiring secure care, and to assist commissioners to make informed planning decisions. Design/methodology/approach – The paper identified people with a learning disability originating from London who were in secure care, and collected data about them. The paper used reference groups to inform the analysis. Findings – The paper identified 249 people in secure services and was able to include 136 patients in the analysis. In all, 64 were in NHS provision and 72 in independent sector provision; 109 (80.1 per cent) were male and 27 (19.9 per cent) female; on average, patients were cared for 61.5 miles away from their homes; NHS patients were far closer to home; 69.1 per cent had a mild learning disability; 82.3 per cent had a history of violence; approximately one in six patients could not progress due to a lack of an appropriate ward, facility, resource and/or intervention. Practical implications – Secure care for this population is a major public health issue. Many are placed a long way from home. Local services should be developed, and there should be sufficiently robust “step down” places for patients to be discharged to. Originality/value – Systematic identification of the needs of a marginalised group to enable better more appropriate care pathways to be developed in the future.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Hanlon, Jeffrey W. "Watershed Protection to Secure Ecosystem Services." Case Studies in the Environment 1, no. 1 (2017): 1–6. http://dx.doi.org/10.1525/cse.2017.sc.400879.

Повний текст джерела
Анотація:
In 1997, New York City and a group of smaller municipalities in the Catskills region of New York came to agree upon a novel and complex means of protecting water quality in the City's upstate reservoirs. The Memorandum of Agreement they authored tied previously uncooperating governments to a new shared goal: preserve the ecological integrity of the Catskill and Delaware watersheds so that the City could avoid chemically filtering its municipal water. The agreement represents a policy experiment in reaction to a stark choice. The U.S. Environmental Protection Agency's 1986 Surface Water Treatment Rule mandated that the City either filter its surface water supply or maintain a watershed control program to ensure the long-term protection of water quality in its source watersheds. The City decided to pursue a watershed control program in lieu of the more expensive filtration. The choice has led to a governing arrangement that has theoretical implications for how to simultaneously secure ecosystem services, promote rural livelihoods, and produce the critical public good of potable water to millions of people. The policy solution displays how cooperative institutions may provide low-cost and low-tech solutions to environmental dilemmas to protect ecosystem services. However, over time, governing entities have faced challenges that raise questions about the durability of the arrangement. This case study explores those challenges to better elucidate the possibilities and pitfalls of watershed governance to secure ecosystem services.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Bacon, Jean, and Ken Moody. "Toward open, secure, widely distributed services." Communications of the ACM 45, no. 6 (June 2002): 59–64. http://dx.doi.org/10.1145/508448.508475.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Thomas, Stuart D. M., Mairead Dolan, Jenny Shaw, Samantha Thomas, Graham Thornicroft, and Morven Leese. "Redeveloping Secure Psychiatric Services for Women." Medicine, Science and the Law 45, no. 4 (October 2005): 331–39. http://dx.doi.org/10.1258/rsmmsl.45.4.331.

Повний текст джерела
Анотація:
Historically, a substantial proportion of women have been unduly detained in conditions of high security in England due to the lack of suitable alternative facilities. There have been no studies that have comprehensively examined the individual needs of these women in relation to their placement needs. A cross sectional survey was undertaken of the individual and placement needs of all females detained in the three high security psychiatric hospitals (HSPHs) in England on 18th October 1999. Whilst there are clearly differences in accommodation needs among the women, those requiring lower secure services are significantly less likely to have needs in relation to violence (OR 0.29, 95% CI 0.14-0.62) and drugs (OR 0.29, 95% CI 0.12-0.67) when length of stay is taken into account. They also have lower security, treatment and dependency needs than women still requiring HSPH treatment. A significant reorganisation of services is required. There is a need to gain further understanding of the relationships between traumatic histories, clinical presentation and antisocial behaviour and how these impact on assessed risk, treatment and care needs and outcome. The special needs of these women should be considered a priority when developing treatment and care packages.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Fabian, Benjamin, Steffen Kunz, Sebastian Müller, and Oliver Günther. "Secure federation of semantic information services." Decision Support Systems 55, no. 1 (April 2013): 385–98. http://dx.doi.org/10.1016/j.dss.2012.05.049.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Tarkoma, Sasu, Jani Heikkinen, and Mikko Pohja. "Secure push for mobile airline services." Telecommunication Systems 35, no. 3-4 (September 12, 2007): 177–87. http://dx.doi.org/10.1007/s11235-007-9048-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Robins, Bill. "How Secure are Mobile Payment Services?" ITNOW 58, no. 2 (May 16, 2016): 34–35. http://dx.doi.org/10.1093/itnow/bww045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Rantos, Konstantinos, Yorgos Katsikogiannis, Andreas Papadakis, and Antonis Ch Stasis. "Secure e-government services across EU." International Journal of Electronic Governance 6, no. 2 (2013): 117. http://dx.doi.org/10.1504/ijeg.2013.058362.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Bartlett, Annie, and Yonette Hassell. "Do women need special secure services?" Advances in Psychiatric Treatment 7, no. 4 (July 2001): 302–9. http://dx.doi.org/10.1192/apt.7.4.302.

Повний текст джерела
Анотація:
Clinicians working with women patients in secure units will already know that they are the centre of a debate not of their own making, which is about the appropriate specification of services for women patients with security needs. This paper attempts to outline the relevant issues and proposed solutions.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Geer, D. "Taking steps to secure web services." Computer 36, no. 10 (October 2003): 14–16. http://dx.doi.org/10.1109/mc.2003.1236464.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Casola, Valentina, Emilio P. Mancini, Nicola Mazzocca, Massimiliano Rak, and Umberto Villano. "Self-optimization of secure web services." Computer Communications 31, no. 18 (December 2008): 4312–23. http://dx.doi.org/10.1016/j.comcom.2008.05.045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Fenicle, Brian, and Tim Wahls. "A secure methodology for interchangeable services." Information and Software Technology 46, no. 5 (April 2004): 343–49. http://dx.doi.org/10.1016/j.infsof.2003.09.010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Huckle, Phil. "Secure Psychiatric Services and The National Service Framework for Mental Health." Mental Health Review Journal 5, no. 1 (March 2000): 21–23. http://dx.doi.org/10.1108/13619322200000006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Thiel, A., T. Tolxdorff, and J. Bernarding. "Realization of Security Concepts for DICOM-based Distributed Medical Services." Methods of Information in Medicine 39, no. 04/05 (2000): 348–52. http://dx.doi.org/10.1055/s-0038-1634446.

Повний текст джерела
Анотація:
Abstract:Exploiting distributed hard- and software resources for tele-medicine requires a fast, secure, and platform-independent data exchange. Standards without inherent security mechanisms such as DICOM may ease non-authorized data access. Therefore, exemplary telemedical data streams were analyzed within the Berlin metropolitan area network using specialized magnetic resonance imaging techniques and distributed resources for data postprocessing. For secure DICOM communication both the Secure Socket Layer Protocol and a DICOM-conform partial encryption of patient-relevant data were implemented. Partial encryption exhibited the highest transfer rate and enabled a secure long-term storage. Different data streams between secured and unsecured networks were realized using partial encryption.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

G.R.Sathiaseelan, J. "Architectural Framework for Secure Composite Web Services." International Journal of Computer Applications 76, no. 1 (August 23, 2013): 18–23. http://dx.doi.org/10.5120/13211-0592.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Meiklejohn, Calum, Kate Sanders, and Sally Butler. "Physical health care in medium secure services." Nursing Standard 17, no. 17 (January 8, 2003): 33–37. http://dx.doi.org/10.7748/ns2003.01.17.17.33.c3323.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Lee, Jae-Seung, Heang-Suk Oh, and Jong-Wook Han. "Security Architecture for Secure Mobile Web Services." Joural of the Korea Entertainment Industry Association 2, no. 2 (December 31, 2008): 43. http://dx.doi.org/10.21184/jkeia.2008.12.2.2.43.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Meiklejohn, Calum, Kate Sanders, and Sally Butler. "Physical health care in medium secure services." Nursing Standard 17, no. 17 (January 8, 2003): 33–37. http://dx.doi.org/10.7748/ns.17.17.33.s55.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Bartoletti, M., P. Degano, G. L. Ferrari, and R. Zunino. "Semantics-Based Design for Secure Web Services." IEEE Transactions on Software Engineering 34, no. 1 (January 2008): 33–49. http://dx.doi.org/10.1109/tse.2007.70740.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Baldwin, Adrian, Chris Dalton, Simon Shiu, Krzysztof Kostienko, and Qasim Rajpoot. "Providing secure services for a virtual infrastructure." ACM SIGOPS Operating Systems Review 43, no. 1 (January 2009): 44–51. http://dx.doi.org/10.1145/1496909.1496919.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Shehab, Mohamed, Kamal Bhattacharya, and Arif Ghafoor. "Web services discovery in secure collaboration environments." ACM Transactions on Internet Technology 8, no. 1 (November 2007): 5. http://dx.doi.org/10.1145/1294148.1294153.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Kang, Hyun-Sun. "Security Model of Secure Cloud Computing Services." Journal of Security Engineering 14, no. 6 (December 31, 2017): 419–28. http://dx.doi.org/10.14257/jse.2017.12.02.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

WHYTE, SEAN, and CHARLOTTE HARRISON. "Substance Misuse Services in Secure Psychiatric Units." Medicine, Science and the Law 44, no. 1 (January 2004): 71–74. http://dx.doi.org/10.1258/rsmmsl.44.1.71.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Lee, Wai-Kong, Raphael C. W. Phan, Geong-Sen Poh, and Bok-Min Goi. "SearchaStore: fast and secure searchable cloud services." Cluster Computing 21, no. 2 (July 4, 2017): 1189–202. http://dx.doi.org/10.1007/s10586-017-0941-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Wiseman, Simon R. "Classification services in the SWORD secure DBMS." Computers & Security 14, no. 4 (January 1995): 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

FUKAZAWA, T., T. NISASE, M. KAWASHIMA, T. HARIU, and Y. OSHIMA. "Safe and Secure Services Based on NGN." IEICE Transactions on Information and Systems E91-D, no. 5 (May 1, 2008): 1226–33. http://dx.doi.org/10.1093/ietisy/e91-d.5.1226.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Zandbelt, J. F., R. J. Hulsebosch, M. S. Bargh, and R. Arends. "Trusted Directory Services for Secure Internet Connectivity." Electronic Notes in Theoretical Computer Science 197, no. 2 (February 2008): 91–103. http://dx.doi.org/10.1016/j.entcs.2007.12.019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Roman, Rodrigo, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, and Marta Bel. "Advanced secure multimedia services for digital homes." Information Systems Frontiers 14, no. 3 (July 31, 2010): 527–40. http://dx.doi.org/10.1007/s10796-010-9258-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Sambrook, Suzanne. "Do recovery principles fit in secure services?" Forensic Update 1, no. 104 (2011): 17–19. http://dx.doi.org/10.53841/bpsfu.2011.1.104.17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Hashemi, Sajjad, Seyyed Yasser Hashemi, and Khalil Monfaredi. "A Novel Service Oriented Architecture (SOA) to Secure Services in E-City." International Journal of Security, Privacy and Trust Management 2, no. 6 (December 31, 2013): 23–29. http://dx.doi.org/10.5121/ijsptm.2013.2602.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Long, C. G., C. Knight, L. Bradley, and M. Thomas. "Effective therapeutic milieus in secure services for women: The service user perspective." Journal of Mental Health 21, no. 6 (December 2012): 567–78. http://dx.doi.org/10.3109/09638237.2012.734649.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Shrivastava, Vivek, and Sunil Malviya. "A Secure Multi Agent VANET Model to Improve Communication Services in VANET." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 2562–66. http://dx.doi.org/10.31142/ijtsrd12833.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Rajkumar, M., E. Kanmani, M. Bhuvanesh, B. Haritha, and B. Kalaiyarasi. "Secure Data Access Privacy Preserving Using Cloud Services." Journal of Physics: Conference Series 1916, no. 1 (May 1, 2021): 012228. http://dx.doi.org/10.1088/1742-6596/1916/1/012228.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Krovvidi, Maansa, and Ch Mvn Sai Teja Prashanth. "Distributed Cellular Framework for Secure Drone Delivery Services." International Journal of Research in Advent Technology 9, no. 9 (October 10, 2021): 1–6. http://dx.doi.org/10.32622/ijrat.99202103.

Повний текст джерела
Анотація:
This paper describes in-depth the architecture of a Distributed Cellular framework for Secure Drone Delivery Services with an additional security layer. Delivery Drones are Unmanned aerial vehicles (UAV) that are responsible for the transportation of goods from one place to another place. In the modern world, with several e-commerce platforms, everything is traded, promoted, advertised online. This causes the need to deliver the packages rapidly and within a stipulated period of time. Unmanned aerial vehicles or drones come into the picture to retort the above-mentioned issue. Security nowadays has become a major concern where hackers are diverting the network traffic, hijacking, and crashing the drones. In order to prevent these attacks from taking place, this paper proposes a strong security framework to minimize these attacks from taking place. The proposed architecture has an additional layer of security which covers the two-factor and multi-factor authentication at the delivery spot. There exists an integration of different sensors like Obstacle detection, SOS detection, Facial Recognition, etc. Beyond the security framework, a distributed cellular network is applied to the delivery services to scatter the drones cell-wise and largen the scope to all remote areas.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Bakken, Sam. "Biometrics light the way for secure financial services." Biometric Technology Today 2021, no. 6 (June 2021): 10–12. http://dx.doi.org/10.1016/s0969-4765(21)00072-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Walker, Tammi, Michelle Morgan, Laura Thompson, and Kevin Scallon. "Why medium secure services need a recovery academy." Mental Health Practice 21, no. 05 (February 6, 2018): 12. http://dx.doi.org/10.7748/mhp.21.05.12.s9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Komathy, K., P. Vivekanandan, and V. Ramachandran. "Secure Soap-Based Web Services for Distance Education." International Journal of Distance Education Technologies 1, no. 2 (April 2003): 72–86. http://dx.doi.org/10.4018/jdet.2003040105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Wang, Cong, Kui Ren, Wenjing Lou, and Jin Li. "Toward publicly auditable secure cloud data storage services." IEEE Network 24, no. 4 (July 2010): 19–24. http://dx.doi.org/10.1109/mnet.2010.5510914.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Carlin, Patricia, Gisli Gudjonsson, and Mary Yates. "Patient satisfaction with services in medium secure units." Journal of Forensic Psychiatry & Psychology 16, no. 4 (December 2005): 714–28. http://dx.doi.org/10.1080/14789940500328245.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії