Статті в журналах з теми "Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kumar, Ashok. "Securing the security." City 18, no. 3 (May 4, 2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Повний текст джерелаNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (March 1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Повний текст джерелаPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Повний текст джерелаAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (March 31, 2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Повний текст джерелаBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Повний текст джерелаNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (June 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Повний текст джерелаKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (October 15, 2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Повний текст джерелаMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (July 1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Повний текст джерелаWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (February 14, 2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Повний текст джерелаEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (September 2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Повний текст джерелаTOMÁŠEK, Martin. "Security Properties Verification of Security Protocols." Acta Electrotechnica et Informatica 14, no. 2 (June 1, 2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.
Повний текст джерелаMuhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (February 28, 2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Повний текст джерелаHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Повний текст джерелаNeamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.
Повний текст джерелаKharb, Latika, and Deepak Chahal. "Cloud Access Security Brokers: Strengthening Cloud Security." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.
Повний текст джерелаDynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (October 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.
Повний текст джерелаWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Повний текст джерелаGia Kvashilava, Gia Kvashilava. "On the History of Some Problems of Economic Security According to Ancient Greek and Latin Sources." New Economist 17, no. 02 (January 6, 2023): 46–52. http://dx.doi.org/10.36962/nec17022022-46.
Повний текст джерелаClough, Patricia Ticineto, and Craig Willse. "Gendered Security/National Security." Social Text 28, no. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.
Повний текст джерелаElliott, Lorraine. "Human security/environmental security." Contemporary Politics 21, no. 1 (January 2, 2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.
Повний текст джерелаPasquinucci, Andrea. "Defeating security with security." Computer Fraud & Security 2008, no. 2 (February 2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.
Повний текст джерелаKeeley, James F. "Review: Security: Writing Security." International Journal: Canada's Journal of Global Policy Analysis 48, no. 3 (September 1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.
Повний текст джерелаHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Повний текст джерелаOthman, Sadeq. "Securing Robotic Communication using Multiple Security Techniques." International Journal of Computer Applications 178, no. 1 (November 15, 2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.
Повний текст джерелаAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Повний текст джерелаRomero Ortiz, María Elena, and Carlos Uscanga Prieto. "Japan: Securing Cooperation or Cooperating to Security?" México y la Cuenca del Pacífico 5, no. 14 (May 1, 2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.
Повний текст джерелаSingh, Ritesh, Lalit Kumar, Debraj Banik, and S. Sundar. "Smart security and securing data through watermarking." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.
Повний текст джерелаShin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (March 31, 2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.
Повний текст джерелаRushton, Simon. "Global Health Security: Security for whom? Security from what?" Political Studies 59, no. 4 (November 7, 2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.
Повний текст джерелаG, Anusha. "Cyber Security." International Journal of Research Publication and Reviews 4, no. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.
Повний текст джерелаManoj Thakur Neha, Rajani. "Cyber Security." International Journal of Science and Research (IJSR) 13, no. 1 (January 5, 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.
Повний текст джерелаToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Повний текст джерелаKyung-Im Cho. "Security Deposit as Collateral Security." Korean Lawyers Association Journal 64, no. 12 (December 2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.
Повний текст джерелаHOFREITER, Ladislav. "SECURITY CULTURE AND SECURITY MANAGEMENT." Krízový Manažment 14, no. 2 (September 30, 2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.
Повний текст джерелаINTRILIGATOR, MICHAEL D. "GLOBAL SECURITY AND HUMAN SECURITY." International Journal of Development and Conflict 01, no. 01 (April 2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.
Повний текст джерелаJohansen, Robert C. "Real Security is Democratic Security." Alternatives: Global, Local, Political 16, no. 2 (April 1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.
Повний текст джерелаMalcolmson, Robert W. "Review: International Security: Alternative Security." International Journal: Canada's Journal of Global Policy Analysis 46, no. 4 (December 1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.
Повний текст джерелаCohen, Fred. "Strategic Security Intelligence — Embedded Security." Network Security 2002, no. 2 (February 2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.
Повний текст джерелаLeach, Dr John. "Security engineering and security RoI." Computers & Security 22, no. 6 (September 2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.
Повний текст джерелаMeyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (January 1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Повний текст джерелаSØRENSEN, GEORG. "Individual Security and National Security." Security Dialogue 27, no. 4 (December 1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.
Повний текст джерелаTrzciński, Łukasz, and Juliusz Piwowarski. "Security culture and security anthropology." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, no. 33 (March 29, 2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.
Повний текст джерелаStosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Повний текст джерелаFekete, Liz. "Peoples' Security Versus National Security." Race & Class 44, no. 3 (January 2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.
Повний текст джерелаPerlmutter, Amos, and Benjamin Frankel. "SECURITY STUDIES and Security Studies." Security Studies 1, no. 1 (September 1991): iv. http://dx.doi.org/10.1080/09636419109347452.
Повний текст джерелаSoneji, Samir, and Gary King. "Statistical Security for Social Security." Demography 49, no. 3 (May 17, 2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.
Повний текст джерелаAlkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Повний текст джерелаSharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Повний текст джерелаChun, Woong. "National Security and Human Security." Korean Journal of International Relations 44, no. 1 (April 30, 2004): 25–49. http://dx.doi.org/10.14731/kjir.2004.04.44.1.25.
Повний текст джерелаSmith, Donna B., and Assistant. "National Security Archive9971National Security Archive. National Security Archive. National Security Archive, URL: www.seas.gwu.edu/nsarchive." Electronic Resources Review 3, no. 7 (July 1999): 77–78. http://dx.doi.org/10.1108/err.1999.3.7.77.71.
Повний текст джерела