Книги з теми "Security subject"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security subject.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 книг для дослідження на тему "Security subject".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Canadian Institute for International Peace and Security. Information Services. Peace and security thesaurus. Ottawa: The Institute, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

The ethical subject of security: Geopolitical reason and the threat against Europe. Milton Park, Abingdon, Oxon, [England]: Routledge, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Cameron, Robin. Subjects of Security. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137274366.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Smith, Evan. Race, gender and the body in British immigration control: Subject to examination. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Stormorken, Bjørn. Human rights terminology in international law: A thesaurus. Dordrecht: M. Nijhoff, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcomittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, September 28, 1994. Washington: U.S. G.P.O., 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Littke, Grant. Subjects of security: Community, identity, and the dynamics of ethnic conflict. Toronto, Ont: Centre for International and Strategic Studies, York University, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

United States. Congress. House. A bill to amend title XVIII of the Social Security Act to prevent overpayment for hospital discharges to post-acute care services by eliminating the limitation on the number of diagnosis-related groups (DRGs) subject to the special transfer policy. Washington, D.C: United States Government Printing Office, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Sychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.

Повний текст джерела
Анотація:
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems". Meets the requirements of Federal state educational standards of higher education of the latest generation. The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of training 10.03.01 "Information security" (bachelor's level). It can also be used in preparation for admission to the master's program.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Assembly, Canada Legislature Legislative. Bill: An act for more effectually securing the liberty of the subject. Quebec: Hunter, Rose & Lemieux, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Yakimova, Vilena, Svetlana Pankova, and Sergey Khmura. Development of the financial control system of foreign economic activity of organizations. ru: Publishing Center RIOR, 2021. http://dx.doi.org/10.29039/02068-5.

Повний текст джерела
Анотація:
The monograph presents the results of research on theoretical and methodological aspects of the control of enterprises engaged in foreign economic activity. The features of export-import operations as a subject area of ​​control carried out by internal and external auditors are disclosed. The paper proposes the development of methodological support for compliance control based on the development of verification programs, working documentation forms, compliance procedures for assessing compliance with financial legislation. The monograph is intended for undergraduates, postgraduates and university students studying in the areas of "Economic security" and "Economics", and can also be useful for managers, chief accountants and economists, analysts and auditors of enterprises in their practical work.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Fedotova, Yuliya. Administrative and legal protection of the rights and legitimate interests of citizens in the field of defense and security of the Russian Federation. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1111367.

Повний текст джерела
Анотація:
The monograph is devoted to the administrative and legal protection of the rights and legitimate interests of citizens in the field of defense and security of the Russian Federation. The mechanism of administrative and legal support of defense and security and the administrative and legal status of citizens as subjects of this activity are disclosed. The author's vision of the concept and content of administrative and legal protection is justified, the functional characteristics of the powers of state authorities are given, and the specifics of state control in this area are indicated. It is intended for students, cadets, postgraduates, teachers, practitioners, as well as a wide range of readers interested in the problems of ensuring defense and security.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Women, New Jersey Legislature General Assembly Advisory Council on. Public meeting of Assembly Advisory Council on Women: Testimony on issues relating to the safety of children, including Internet use which is the subject of P.L. 1998, c. 126; issues involving criminal invasion of children's privacy, and related matters : [December 4, 2000, Trenton, New Jersey]. Trenton, N.J: The Unit, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Fedotova, Elena. Computer science. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1200564.

Повний текст джерела
Анотація:
The basic concepts in the field of computer science are given, the main categories of computer hardware and software, the principles of building the architecture of computer systems are described. The structural organization of data and the basics of algorithmization, types of software, classification of information technologies and systems, modern document management and office management automation systems, the basics of building artificial intelligence systems, geoinformation systems, virtual reality systems, as well as the basics of information security are considered. Meets the requirements of the federal state educational standards of higher education of the latest generation. It is intended for students of higher technical educational institutions studying the discipline "Computer Science", for teachers and specialists working in this field, as well as for those who study this subject area independently.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Anna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. New York: Continuum, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Burgess, J. Peter. The Ethical Subject of Security. Routledge, 2011. http://dx.doi.org/10.4324/9780203828946.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Organisation, Export Control, ed. List of goods subject to security export control September 1991. London: Department of Trade and Industry, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Hekman, Susan J. Feminine Subject. Polity Press, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Author, title, & subject index to the Social Security Bulletin, 1980-97. Washington, DC: Social Security Administration, Office of Research, Evaluation, and Statistics, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

A, Marbray Phyllis, United States. Social Security Administration., and United States. Social Security Administration. Office of Research and Statistics., eds. Author, title, and subject index to the Social Security Bulletin, 1980-88. Washington, D.C: U.S. Dept. of Health and Human Services, Social Security Administration, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

The feminine subject. Polity, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

The Vulnerable Subject Beyond Rationalism In International Relations. Palgrave MacMillan, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

A, Marbray Phyllis, United States. Social Security Administration., and United States. Social Security Administration. Office of Research and Statistics., eds. Author, title, and subject index to the Social Security Bulletin, 1980-88. Washington, D.C: U.S. Dept. of Health and Human Services, Social Security Administration, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Mediating Security: Comprehensive Approaches to an Ambiguous Subject - Festschrift for Otmar Hoell. Lang GmbH, Internationaler Verlag der Wissenschaften, Peter, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Pospisil, Jan, and Alexander Klimburg. Mediating Security: Comprehensive Approaches to an Ambiguous Subject - Festschrift for Otmar Hoell. Lang GmbH, Internationaler Verlag der Wissenschaften, Peter, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Hayes, Anna. Human (In)Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.32.

Повний текст джерела
Анотація:
The 1990s was host to a range of conflicts emerging from weak or failed states. These conflicts typically involved significant humanitarian crises and widespread human rights abuses. Within this changing global environment, new security thinking started to engage “people” as the referent of security, moving away from the previous privileged status granted to the state as the only referent of security. The end of the Cold War enabled the human security paradigm to provide a significant challenge to the primacy of the state in security thinking. On the other hand, human security has been subject to much criticism and there has been heated debate over its applicability within the security agenda. This chapter argues that despite earlier concerns over its efficacy, human security has made inroads into security thinking and is mutually reinforcing to national security.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Butt, Ahsan I. Secession and Security. Cornell University Press, 2017. http://dx.doi.org/10.7591/cornell/9781501713941.001.0001.

Повний текст джерела
Анотація:
This book argues that states, rather than separatists, determine whether a secessionist struggle will be peaceful, violent, or genocidal. The book investigates the strategies, ranging from negotiated concessions to large-scale repression, adopted by states in response to separatist movements. Variations in the external security environment, the book argues, influenced the leaders of the Ottoman Empire to use peaceful concessions against Armenians in 1908 but escalated to genocide against the same community in 1915; caused Israel to reject a Palestinian state in the 1990s; and shaped peaceful splits in Czechoslovakia in 1993 and the Norway–Sweden union in 1905. Using more than one hundred interviews and extensive archival data, the book focuses on two main cases — Pakistani reactions to Bengali and Baloch demands for independence in the 1970s and India's responses to secessionist movements in Kashmir, Punjab, and Assam in the 1980s and 1990s. The book's deep historical approach to the subject will appeal to policymakers and observers interested in the last five decades of geopolitics in South Asia, the contemporary Israeli–Palestinian conflict, and ethno-national conflict, separatism, and nationalism more generally.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Sime, Stuart. 26. Security for costs. Oxford University Press, 2016. http://dx.doi.org/10.1093/he/9780198747673.003.3123.

Повний текст джерела
Анотація:
The question of who pays for the costs of a claim is generally not determined until the claim is finally disposed of, whether by consent, interim process, or trial. However, an order for security for costs can be made against a party in the position of a claimant. Once security is given it may be retained, subject to the court’s discretion, pending an appeal. An order for security for costs usually requires the claimant to pay money into court as security for the payment of any costs order that may eventually be made in favour of the defendant, and staying the claim until the security is provided. On the application three matters arise: (a) whether one of the conditions for ordering security for costs is satisfied; (b) if so, whether, having regard to all the circumstances of the case, it would be just to exercise the court’s discretion in favour of making the order; and (c) if so, how much security should be provided. This chapter considers each of these three matters. It begins by looking at the procedure for making the application and the capacity of the respondent to the application.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Sime, Stuart. 26. Security for Costs. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198823100.003.3123.

Повний текст джерела
Анотація:
The question of who pays for the costs of a claim is generally not determined until the claim is finally disposed of, whether by consent, interim process, or trial. However, an order for security for costs can be made against a party in the position of a claimant. Once security is given it may be retained, subject to the court’s discretion, pending an appeal. An order for security for costs usually requires the claimant to pay money into court as security for the payment of any costs order that may eventually be made in favour of the defendant, and staying the claim until the security is provided. On the application three issues arise: (a) whether one of the conditions for ordering security for costs is satisfied; (b) if so, whether, having regard to all the circumstances of the case, it would be just to exercise the court’s discretion in favour of making the order; and (c) if so, how much security should be provided. This chapter considers each of these three issues. It begins by looking at the procedure for making the application and the capacity of the respondent to the application.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Sime, Stuart. 26. Security for costs. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787570.003.3123.

Повний текст джерела
Анотація:
The question of who pays for the costs of a claim is generally not determined until the claim is finally disposed of, whether by consent, interim process, or trial. However, an order for security for costs can be made against a party in the position of a claimant. Once security is given it may be retained, subject to the court’s discretion, pending an appeal. An order for security for costs usually requires the claimant to pay money into court as security for the payment of any costs order that may eventually be made in favour of the defendant, and staying the claim until the security is provided. On the application three matters arise: (a) whether one of the conditions for ordering security for costs is satisfied; (b) if so, whether, having regard to all the circumstances of the case, it would be just to exercise the court’s discretion in favour of making the order; and (c) if so, how much security should be provided. This chapter considers each of these three matters. It begins by looking at the procedure for making the application and the capacity of the respondent to the application.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Gray, Kevin, and Susan Francis Gray. 6. Security interests in land. Oxford University Press, 2013. http://dx.doi.org/10.1093/he/9780199603794.003.0006.

Повний текст джерела
Анотація:
Titles in the Core Text series take the reader straight to the heart of the subject, providing focused, concise, and reliable guides for students at all levels. Land is a potential source for a number of important security interests. In particular, a ‘mortgage’ (or ‘charge’) of land initiates one of the most significant kinds of credit relationship in the modern world. This chapter discusses the following: the creation and termination of various kinds of mortgage or charge over land; the means by which the law affords protection to the borrower (or ‘mortgagor’); the means by which the law affords protection to the lender (or ‘mortgagee’); the remedies available to the mortgagee in the event of default by the mortgagor; the priority of mortgages inter se; and other forms of security interest in land such as rentcharges and rights of entry.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Eileen, Denza. Exemption from Social Security Provisions. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0037.

Повний текст джерела
Анотація:
This chapter examines Article 33 of the Vienna Convention on Diplomatic Relations which deals with the exemption from social security provisions. The Article states that, subject to Article 33.3, a diplomatic agent shall exempt from social security provisions in the receiving State. This exemption shall also apply to private servants employed under the diplomatic agent, on condition: (a) that they are not nationals of or permanently resident in the receiving State; and (b) that they are covered by the social security provisions which may be in force in the sending State or a third State. In addition, the Article expresses that a diplomatic agent who employs persons to whom the exemption provided fordoes not apply shall observe social security obligations. Finally, the Article states that the exemption provided in Article 33.1 and 33.2 shall not preclude voluntary participation in the social security system of the receiving State provided that such participation is permitted by that State, and that this Article shall not affect bilateral or multilateral agreements concerning social security.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Hugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. The Law of Security and Title-Based Financing. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.001.0001.

Повний текст джерела
Анотація:
Personal property security is an important subject in commercial practice as it is the key to much of the law of banking and sale. This book examines traditional methods of securing debts (such as mortgages, charges, and pledges) on property other than land, describing how these are created, how they must be registered (or otherwise ‘perfected’) if they are to be valid, the rights and duties of the parties, and how the security is enforced if the debt is not paid. This third edition has been updated to cover the wealth of case law, including new cases on control of financial collateral, and relief against forfeiture under a financial collateral arrangement; on retention of title (including the effect of ‘extended’ clauses); estoppel and the HPI register; availability of set-off against assignee; a number of cases on enforcement of security; equitable liens; solicitor’s liens and databases; on priority or purchase money security interests; and the Irish Supreme Court decision on floating charge and crystallization. There have also been significant legislative changes, which are discussed in detail, most notably the 2013 amendments to Companies Act 2006 Part 25, and Cape Town Convention. The book covers traditional security over personal property and also devices that fulfil a similar economic function, such as retention of title and sales of receivables.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Trevor C, Hartley. Part I General and Introductory, 5 Subject-Matter Scope: Specific Exclusions. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780198729006.003.0005.

Повний текст джерела
Анотація:
This chapter consider matters specifically excluded from the scope of Brussels 2012, Lugano 2007, and the Hague Convention. Each of these instruments contains a list of subjects — for example, status of natural persons — that are excluded from its scope. Under Brussels, and almost certainly under Lugano and Hague as well, these legal concepts have an autonomous meaning. They are not interpreted according to national law. If this were not so, the scope of the instrument would vary from State to State. Topics discussed include rights in property arising out of a matrimonial relationship, wills and succession, bankruptcy, social security, arbitration, maintenance, consumer contracts, employment contracts, carriage of persons and goods, maritime matters, competition (antitrust) matters, liability for nuclear damage, personal injury, damage to property, matters subject to exclusive jurisdiction, infringement of intellectual property rights, and declarations under the Hague Convention.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Hugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. Part II Description of Interests, 6 Non-Possessory Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.003.0006.

Повний текст джерела
Анотація:
This chapter analyses the nature of mortgage. It is a non-possessory security whereby the mortgagor transfers ownership to the mortgagee subject to an obligation to retransfer ownership on satisfaction of the underlying obligation. Since equity will enforce the retransfer, the right to it is not personal but amounts to an equitable interest called the equity of redemption. The actual right to redeem can be a legal right, arising expressly from the contract of mortgage: if that legal right to redeem is not exercised, an equitable right to redeem arises. However, since equity will enforce even the legal right to redeem against third parties, the mortgagor has an equitable interest called the ‘equity of redemption’ from the commencement of the mortgage.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Subjects of Security New Security Challenges. Palgrave Macmillan, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Fröhlich, Manuel, and Abiodun Williams, eds. The UN Secretary-General and the Security Council. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198748915.001.0001.

Повний текст джерела
Анотація:
The United Nations Secretary-General and the United Nations Security Council spend significant amounts of time on their relationship with each other. They rely on each other for such important activities as peacekeeping, international mediation, and the formulation and application of normative standards in defense of international peace and security—in other words, the executive aspects of the UN’s work. The edited book The UN Secretary-General and the Security Council: A Dynamic Relationship aims to fill an important lacuna in the scholarship on the UN system. Although there exists an impressive body of literature on the development and significance of the Secretariat and the Security Council as separate organs, an important gap remains in our understanding of the interactions between them. Bringing together some of the most prominent authorities on the subject, this volume is the first book-length treatment of this topic. It studies the UN from an innovative angle, creating new insights on the (autonomous) policy-making of international organizations and adding to our understanding of the dynamics of intra-organizational relationships. Within the book, the contributors examine how each Secretary-General interacted with the Security Council, touching upon such issues as the role of personality, the formal and informal infrastructure of the relationship, the selection and appointment processes, as well as the Secretary-General’s threefold role as a crisis manager, administrative manager, and manager of ideas.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Chris, Trelawny. 5 The IMO: Maritime Security: An Essential Feature for Sustainable Maritime Development and Global Ocean Governance. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198823957.003.0005.

Повний текст джерела
Анотація:
This chapter provides a new perspective on the subject of maritime security. It argues that piracy and armed robbery at sea are in reality land-based problems, the root causes of which still remain to be addressed by the international community. However, this chapter also maintains that, instead of focussing on short-term security measures, the stress factors that lead to instability, insecurity, and uncontrolled mass migration should also be addressed. The aim should be to improve economic development, supported by maritime development and underpinned by maritime security. Furthermore, the chapter examines not only the issue of piracy and terrorism at sea but also International Maritime Organization (IMO) measures aimed at improving security of international movements of containers, which has a wider implication than just prevention of terrorism and the protection of customs revenues.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Hugh, Beale, Bridge Michael, Gullifer Louise, and Lomnicka Eva. Part IV Priorities, 16 Priority Between Consensual and Non-Consensual Security Interests. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198795568.003.0016.

Повний текст джерела
Анотація:
This chapter demonstrates how, in the case of things in possession, non-consensual security interests may be treated as consisting, for present purposes, of liens, in favour of carriers, repairers, and the like; of maritime liens (and similar statutory rights), in favour of master and crew; claimants against the ship, suppliers, and repairers; rights of distress, in favour of local authorities; rights of commercial rent arrears recovery in favour of landlords; and of execution creditors. In these various instances, the rights of the lienholder, landlord, local authority, and execution creditor, as the case may be, against a competing chargee are part of the larger subject of how those rights might be exercised against the owner in those cases where the owner is not the person in possession of the thing.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

GOVERNMENT, US. Cold War era human subject experimentation: Hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, ... Congress, second session, September 28, 1994. For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Stormorken, Bjorn, and Leo Zwaak. Human Rights Terminology in International Law: A Thesaurus. Kluwer Law International, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Wathen, Thomas W. Security Subjects: A Primer for Protection Officers. Guardian Security Publications, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Security Subjects: A Primer for Protection Officers. Guardian Security Pubns, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Spyridon V, Bazinas. Ch.4— The Geneva Securities Convention and UNCITRAL Texts on Secured Transactions Compared. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0004.

Повний текст джерела
Анотація:
This section of the noter-up complements Transnational Securities Law by Thomas Keijser and discusses updates which relate to comparing the Geneva Securities Convention and UNCITRAL texts on the subject of secured transactions. These include the following subject areas: Geneva Securities Convention; Security interest; Securities account; Hague Securities Convention; and Enforcement.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Thomas, Keijser. Ch.1— The Best Rules for Non-Intermediated Securities. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0001.

Повний текст джерела
Анотація:
This section of the noter-up complements Transnational Securities Law by Thomas Keijser and directs the reader to section N-4-1 of the noter-up which compares in the Geneva Securities Convention and UNCITRAL texts on the subject of secured transactions. These include the following subject areas: Geneva Securities Convention; Security interest; Securities account; Hague Securities Convention; and Enforcement.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Thomas, Keijser, Morton Guy, and Peeters Marcel. Ch.2— Financial Collateral: From Private to Regulatory Law Reform. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0002.

Повний текст джерела
Анотація:
This section of the noter-up complements Transnational Securities Law by Thomas Keijser and discusses updates which relate to financial collateral. These include the following subject areas: Collateral agreement; Bank resolution and insolvency; and Security interest.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Gray, Kevin, and Susan Francis Gray. Land Law. Oxford University Press, 2013. http://dx.doi.org/10.1093/he/9780199603794.001.0001.

Повний текст джерела
Анотація:
Titles in the Core Text series take the reader straight to the heart of the subject, providing focused, concise, and reliable guides for students at all levels. Land Law provides a reliable explanation of the key elements of this subject, making it an invaluable guide. The book sets land law in its socio-political and economic context, enabling students to examine this subject in depth. The topics it covers include fundamental concepts, possession and title, freehold and leasehold ownership, and easements and profits à prendre. The book also looks at security interests, beneficial ownership, dealings, modes of acquisition, privacy, and public regulation of land.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Thomas, Keijser, ed. General Update. Oxford University Press, 2014. http://dx.doi.org/10.1093/law/9780191821790.003.0005.

Повний текст джерела
Анотація:
This section of the noter-up complements Transnational Securities Law by Thomas Keijser and discusses updates which relate to the main edition as a whole. These include the following subject areas: Non-intermediated securities; Security interest; Geneva Securities Convention; Intermediated securities; and Central Securities Depository (CSD).
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії