Книги з теми "Security object"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security object.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 книг для дослідження на тему "Security object".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Thuraisingham, B., R. Sandhu, and T. C. Ting, eds. Security for Object-Oriented Systems. London: Springer London, 1994. http://dx.doi.org/10.1007/978-1-4471-3858-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

OOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

OOPSLA Conference Workshop on Security for Object-oriented Systems (1993 Washington, DC, USA). Security for Object-oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-oriented Systems, Washington DC, USA, 26 September 1993. London: Springer-Verlag, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Blakley, Bob. CORBA security: An introduction to safe computing with objects. Reading, Mass: Addison-Wesley, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

The search for the secure base: Attachment theory and psychotherapy. Philadelphia, PA: Brunner-Routledge, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Inc, ebrary, ed. Professional Cocoa application security. Indianapolis, Ind: Wiley, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

de, Paula Everton G. Clustering, concurrency control, crash recovery, garbage collection, and security in object-oriented database management systems. Monterey, Calif: Naval Postgraduate School, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Bennett, Stacey Patricia. An object oriented expert system for specifying computer data security requirements in an Open Systems environment. Birmingham: University of Birmingham, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Exploring in security: Towards an attachment-informed psychoanalytic psychotherapy. Hove, East Sussex: Routledge, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

OOPSLA (Conference) (1995 Austin, Tex.). Business object design and implementation: OOPSLA '95 workshop proceedings,16 October 1995, Austin, Texas. London: Springer, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Duyunov, Vladimir, and Ruslan Zakomoldin. Criminal law impact in the mechanism of ensuring national security. ru: Publishing Center RIOR, 2020. http://dx.doi.org/10.29039/02045-6.

Повний текст джерела
Анотація:
The monograph examines the social and legal nature of the category "national security" as a socially significant good, an object of criminal law protection and a general object of crimes. The existence of a specific "sphere of crimes and crime" in public life is substantiated, its general characteristics are given, and the state of crime is analyzed as one of the most dangerous threats to national security in modern conditions. The problem of ensuring national security by criminal law means, the place and role of criminal policy and criminal law in the policy of combating crime and ensuring the national security of Russia are considered. Defines the concept of criminal law impact as a law-mediated reaction of the state to crime and crime, one of the key directions of the policy of combating crime, a comprehensive criminal law institution and one of the elements of the mechanism for ensuring national security. The publication is intended for students, postgraduates, researchers, teachers of law schools, employees of law enforcement agencies and all persons interested in the problems of law and law enforcement.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

1957-, Patel D., Sutherland Jeffrey Victor, and Miller J, eds. Business object design and implementation II: OOPSLA '96, OOPSLA '97, and OOPSLA '98 workshop proceedings. London: Springer, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Berry, Joy Wilt. Security objects. Chicago: Childrens Press, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Yatake, Kenrō. Obujekuto shikō riron ni yoru faiā wāru sāba no kenshō. Nomi, Japan: JAIST Press, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Zagladine, Vadim. Notre objectif: Une securite internationale globale. Moscou: Editions de l'Agence de presse Novosti, 1986.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Hirsch, Martin. Sécu : objectif monde: Le défi universel de la protection sociale. [Paris]: Stock, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Justin, Gehtland, ed. Rails for Java developers. Raleigh, N.C: Pragmatic Programmer, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Dolan, Richard M. UFOs and the national security state: An unclassified history. Rochester, N.Y: Keyhole Publishing, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Lysova, Ekaterina, Oksana Paramonova, Natal'ya Samarskaya, and Natal'ya Yudina. Environmental monitoring. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1069167.

Повний текст джерела
Анотація:
Outlines General environmental monitoring. Special attention is paid to the monitoring of atmospheric air, water objects, soil-ecological monitoring and biodiversity monitoring. Can be useful for students studying in areas of training 20.03.01 "Technospheric security", specialization "environmental Protection and resource saving", "Engineering protection of environment", as well as for professionals in the field of environmental protection.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Wehrens, Dr Hans Georg. Real Security regarding Immovable Objects - Reflections on a Euro-Mortgage: Chapter 42 of "Towards a European Civil Code". 3rd ed. Den Haag / London / Boston: Kluwer Law International, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Marguerite, McCall, and Hanzel Robert, eds. The universal seduction: Piercing the veils of deception. Las Vegas, Nev: Rose Garden, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Olmos, Vicente-Juan Ballester. Expedientes insólitos: [el fenómeno OVNI y los archivos de Defensa]. Madrid: Ediciones Temas de Hoy, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Prokopenko, Igorʹ. Prishelʹtsy gosudarstvennoĭ vazhnosti: Voennai︠a︡ taĭna. Moskva: ĖKSMO, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Randle, Kevin D. Case MJ-12: The true story behind the government's UFO conspiracies. New York: HarperTorch, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Galinovskaya, Elena, Elena Boltanova, Gennadiy Volkov, Galina Vyphanova, I. Ignat'eva, N. Kichigin, E. Kovaleva, et al. Zones with special conditions of use of territories (problems of the establishment and implementation of the legal regime). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1080400.

Повний текст джерела
Анотація:
The peculiarities of the modern spatial development necessitated the development of organizational, managerial and legal measures to reduce the risks of neighbourhood objects that have a negative impact on humans and the environment, as well as to strengthen the protection of especially dangerous or sensitive objects. Introduction to the Land code of the Russian Federation the concept of "zones with special conditions of use of territories" is one of the promising solutions to the above tasks and is aimed at ensuring sanitary and epidemiological welfare of the population, industrial safety, safety in operating all types of transport, defence and state security, environmental protection etc. The Handbook describes the concept and the legal nature of the zones with special conditions of use of territories as a new category, which should become a full part of fur- the mechanism of the land law regulation. Describes the evolution of national legislation on conservation and protection zones, the analysis of the regulation of similar zones in foreign legislation. Special attention is paid to General issues of the legal regime of these zones, the specifics of their establishment and accounting. Researched legal requirements for the adherence of all types of zones with special conditions of use. For practitioners and specialists in the field of state and municipal administration, scientific workers and lecturers of higher and secondary professional educational institutions, students, graduates, and also for a wide range of readers.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Dashorst, Martijn. Wicket in action. Greenwich, CT: Manning, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Dashorst, Martijn. Wicket in action. Greenwich, CT: Manning, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Rossinskiy, Sergey. Pre-trial proceedings in a criminal case: the nature and methods of collecting evidence. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1244960.

Повний текст джерела
Анотація:
The monograph is devoted to a comprehensive review of the problems of pre-trial evidence collection as one of the stages of the general procedural mechanism aimed at establishing the circumstances relevant to the criminal case. The essence, methodological basis and system of investigative actions, forensic examinations and other procedural methods of collecting evidence that make up the modern arsenal of bodies of inquiry and preliminary investigation are investigated. The main cognitive and security technologies used in conducting investigative and other procedural actions are highlighted. The problems of the theory and legal regulation of the general rules of their implementation, the procedural status of their participants, fixing their progress and results, judicial control over their production are reflected; the actual problems of investigative inspection, examination, search, interrogation, confrontation, forensic examination, as well as the presentation, demand and seizure (seizure) of objects and documents are considered. Special attention is paid to the applied aspects, the analysis of errors and difficulties that arise in modern law enforcement practice, and possible ways to overcome them are proposed. For researchers and practitioners, teachers, postgraduates( adjuncts), students, as well as anyone interested in topical issues of criminal procedure law and criminology.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Redfern, Nicholas. Keep out!: Top secret places governments don't want you to know about. Pompton Plains, NJ: New Page Books, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Top secret/MAJIC. New York: Marlowe & Co., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

J. Paul Getty Museum. Emergency planning handbook. Malibu: J. Paul Getty Museum, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Museum, Royal Ontario. Disaster plan. [Toronto, Ont: The Museum, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Blakley, Robert, and Bob Blakley. CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series). Addison Wesley Longman, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

A focus on object-oriented technology: Experiences & outlooks. [S.l.]: Information Management Forum, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Thuraisingham, Bhavani M. Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, (Workshops in Computing). Springer, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Workshop on Security for Object-Oriented Systems, R. Sandhu, and B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Stuart, Casey-Maslen, Clapham Andrew, Giacca Gilles, and Parker Sarah. Art.1 Object and Purpose. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198723523.003.0005.

Повний текст джерела
Анотація:
This chapter examines Article 1 of theATT, which sets out the objectives and purpose of the ATT. The provision is divided into two parts, the first of which outlines the ‘object’ of the treaty, while the second part summarizes the ATT’s ‘purpose’. Article 1 sets the ‘highest possible common international standards’ for regulating the international trade in conventional arms; preventing and eradicating illicit trade and preventing diversion are stipulated as the treaty’s object. The purpose of the ATT is to contribute to international and regional peace, security, and stability; reduce human suffering; and promote co-operation, transparency, and responsible action by states parties in international trade in conventional arms, thereby ‘building confidence’ among them.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Miller, J., C. Casanave, G. Hollowell, D. Patel, and J. Sutherland. Business Object Design and Implementation: OOPSLA'95 Workshop Proceedings. Springer-Verlag Telos, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Buzan, Barry, and Lene Hansen. Defining–Redefining Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.382.

Повний текст джерела
Анотація:
International security studies (ISS) has significantly evolved from its founding core of “golden age” strategic studies. From the onset of the Cold War in the late 1940s through to the 1970s, strategic studies virtually was ISS, and remains a very large part of it. The fact that it continues to stand as the “mainstream” attacked by widening/deepening approaches further speaks to its status as a “core.” This core consists of those literatures whose principal concern is external military threats to the state, and the whole agenda of the use of force which arises from that. This core was originally focused on nuclear weapons and the military-political rivalry between the US and the Soviet Union, but has since adapted its focus to changes in the salience and nature of military threats caused by the end of the Cold War and 9/11. It includes literatures on deterrence, arms racing, arms control and disarmament, grand strategy, wars (and “new wars”), the use of force, nuclear proliferation, military technology, and terrorism. Debates within ISS are structured, either implicitly or explicitly, by five questions: (1) which referent object to adopt, (2) whether to understand security as internally or externally driven, (3) whether to limit it to the military sector or to expand it, (4) what fundamental thinking about (international) politics to adopt, and (5) which epistemology and methodology to choose.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Workshop on Security for Object-Oriented Systems, J. Miller, Jeffrey Victor Sutherland, and D. Patel. Business Object Design and Implementation: Oopsla '96, Oopsla '97, and Oopsla '98 Workshop Proceedings. Springer, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Non-Imaging Millimeter and Microwave-Wave Sensors for Concealed Object Detection. Taylor & Francis Group, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Advances in mobile agents systems research: Theory and applications, a framework for mobile agent systems, separation of concerns in mobile object programs, supporting mobility and concurrency, a secure agent framework environment for telecommunication ... Windsor, Ont: International Institute for Advanced Studies in Systems Research and Cybernetics, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

A, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

A, Nazario Noel, and National Institute of Standards and Technology (U.S.), eds. General procedures for registering computer security objects. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

O'Halloran, Barbara Collopy. Creature Comforts: People and Their Security Objects. Houghton Mifflin, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

1952-, Belsky Jay, and Nezworski Teresa, eds. Clinical implications of attachment. Hillsdale, N.J: L. Erlbaum Associates, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Berry, Joy Wilt. Teach Me About Security Objects (Teach Me About Books). Children's Press (CT), 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Davé, Shilpa S. “Running from the Joint”. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037405.003.0007.

Повний текст джерела
Анотація:
This chapter examines how the sequel film Harold and Kumar Escape from Guantanamo Bay (2008) establishes Harold and Kumar as patriotic, racialized American citizens who are able to question American federal policy towards outsiders and regional stereotypes in the south in a post-9/11 heightened-security era. Harold and Kumar become the characters that the audience roots for. As in the first film, an Indian accent is not a performative characteristic or object. What is notable is that Harold and Kumar are “accent-less,” so their racial position does not define them. They do not act as cultural objects. In the world of the second film, however, government officials focus on what they look like—they are made hypervisible and seen only as a potential threat to the nation. In contrast to narrative of the paranoid security officials, the rest of the film minimizes their racial threat by having everyone else misrecognize them or surrounds them with exaggerated stereotypes that make Harold and Kumar normative and patriotic. The film allows Kumar, the victim of racial profiling, to protest his treatment and through humor diffuse some of the tension about issues related to detainment and racial profiling.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії