Статті в журналах з теми "Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kumar, Ashok. "Securing the security." City 18, no. 3 (May 4, 2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Повний текст джерелаNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (March 1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Повний текст джерелаPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Повний текст джерелаAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (March 31, 2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Повний текст джерелаBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Повний текст джерелаNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (June 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Повний текст джерелаKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (October 15, 2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Повний текст джерелаMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (July 1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Повний текст джерелаWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (February 14, 2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Повний текст джерелаEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (September 2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Повний текст джерелаTOMÁŠEK, Martin. "Security Properties Verification of Security Protocols." Acta Electrotechnica et Informatica 14, no. 2 (June 1, 2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.
Повний текст джерелаMuhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (February 28, 2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Повний текст джерелаHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Повний текст джерелаNeamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.
Повний текст джерелаKharb, Latika, and Deepak Chahal. "Cloud Access Security Brokers: Strengthening Cloud Security." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.
Повний текст джерелаDynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (October 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.
Повний текст джерелаWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Повний текст джерелаClough, Patricia Ticineto, and Craig Willse. "Gendered Security/National Security." Social Text 28, no. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.
Повний текст джерелаElliott, Lorraine. "Human security/environmental security." Contemporary Politics 21, no. 1 (January 2, 2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.
Повний текст джерелаPasquinucci, Andrea. "Defeating security with security." Computer Fraud & Security 2008, no. 2 (February 2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.
Повний текст джерелаKeeley, James F. "Review: Security: Writing Security." International Journal: Canada's Journal of Global Policy Analysis 48, no. 3 (September 1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.
Повний текст джерелаHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Повний текст джерелаOthman, Sadeq. "Securing Robotic Communication using Multiple Security Techniques." International Journal of Computer Applications 178, no. 1 (November 15, 2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.
Повний текст джерелаAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Повний текст джерелаRomero Ortiz, María Elena, and Carlos Uscanga Prieto. "Japan: Securing Cooperation or Cooperating to Security?" México y la Cuenca del Pacífico 5, no. 14 (May 1, 2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.
Повний текст джерелаSingh, Ritesh, Lalit Kumar, Debraj Banik, and S. Sundar. "Smart security and securing data through watermarking." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.
Повний текст джерелаShin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (March 31, 2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.
Повний текст джерелаRushton, Simon. "Global Health Security: Security for whom? Security from what?" Political Studies 59, no. 4 (November 7, 2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.
Повний текст джерелаG, Anusha. "Cyber Security." International Journal of Research Publication and Reviews 4, no. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.
Повний текст джерелаManoj Thakur Neha, Rajani. "Cyber Security." International Journal of Science and Research (IJSR) 13, no. 1 (January 5, 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.
Повний текст джерелаToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Повний текст джерелаKyung-Im Cho. "Security Deposit as Collateral Security." Korean Lawyers Association Journal 64, no. 12 (December 2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.
Повний текст джерелаHOFREITER, Ladislav. "SECURITY CULTURE AND SECURITY MANAGEMENT." Krízový Manažment 14, no. 2 (September 30, 2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.
Повний текст джерелаINTRILIGATOR, MICHAEL D. "GLOBAL SECURITY AND HUMAN SECURITY." International Journal of Development and Conflict 01, no. 01 (April 2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.
Повний текст джерелаJohansen, Robert C. "Real Security is Democratic Security." Alternatives: Global, Local, Political 16, no. 2 (April 1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.
Повний текст джерелаMalcolmson, Robert W. "Review: International Security: Alternative Security." International Journal: Canada's Journal of Global Policy Analysis 46, no. 4 (December 1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.
Повний текст джерелаCohen, Fred. "Strategic Security Intelligence — Embedded Security." Network Security 2002, no. 2 (February 2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.
Повний текст джерелаLeach, Dr John. "Security engineering and security RoI." Computers & Security 22, no. 6 (September 2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.
Повний текст джерелаMeyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (January 1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Повний текст джерелаSØRENSEN, GEORG. "Individual Security and National Security." Security Dialogue 27, no. 4 (December 1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.
Повний текст джерелаTrzciński, Łukasz, and Juliusz Piwowarski. "Security culture and security anthropology." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, no. 33 (March 29, 2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.
Повний текст джерелаStosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Повний текст джерелаFekete, Liz. "Peoples' Security Versus National Security." Race & Class 44, no. 3 (January 2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.
Повний текст джерелаPerlmutter, Amos, and Benjamin Frankel. "SECURITY STUDIES and Security Studies." Security Studies 1, no. 1 (September 1991): iv. http://dx.doi.org/10.1080/09636419109347452.
Повний текст джерелаSoneji, Samir, and Gary King. "Statistical Security for Social Security." Demography 49, no. 3 (May 17, 2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.
Повний текст джерелаAlkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Повний текст джерелаSharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Повний текст джерелаChun, Woong. "National Security and Human Security." Korean Journal of International Relations 44, no. 1 (April 30, 2004): 25–49. http://dx.doi.org/10.14731/kjir.2004.04.44.1.25.
Повний текст джерелаSmith, Donna B., and Assistant. "National Security Archive9971National Security Archive. National Security Archive. National Security Archive, URL: www.seas.gwu.edu/nsarchive." Electronic Resources Review 3, no. 7 (July 1999): 77–78. http://dx.doi.org/10.1108/err.1999.3.7.77.71.
Повний текст джерелаShakir, Taif Khalid, Rabah Scharif, and Manal M. Nasir. "A Proposed Blockchain based System for Secure Data Management of Computer Networks." Journal of Cybersecurity and Information Management 11, no. 2 (2023): 36–46. http://dx.doi.org/10.54216/jcim.110204.
Повний текст джерела