Limit search to available items
Nearby Subjects are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
Security classification (Government documents) -- United States -- Periodicals : Annual report to the President  1989 1
Security clearances.   17
Security clearances -- Australia. : A review of security assessment procedures / report of the Parliamentary Joint Committee on the Australian Security Intelligence Organization  1994 1
Security clearances -- Law and legislation. : Why shoes on the belt? / produced by United States Transportation Security Administration  2009 1
Security clearances -- United States.   17
Security clearances -- United States -- Cases : Case studies in personnel security / collected under the direction of Adam Yarmolinsky  1955 1
Security clearances -- United States -- Evaluation : The Washington Navy Yard shootings : internal and independent reviews / Stanley R. Wallace, editor  2014 1
security climate international organizations EU OSCE NATO Europe : European regional organizations and climate-related security risks : EU, OSCE and NATO / Niklas Bremberg  2018 1
security climate international organizations R&D risk assessment : IGOs and global climate security challenges : implications for academic research and policymaking / Lisa M. Dellmuth, Maria-Therese Gustafsson, Niklas Bremberg and Malin Mobjörk  2017 1
security Colombia internal politics development : Back from the brink evaluating progress in Colombia, 1999-2007 : a report of the Americas Program Center for Strategic and International Studies / Authors: Peter Deshazo, Tanya Primiani, Phillip McLean  2007 1
 

Security companies, Private -- See Private security services


Here are entered works on organizations outside the public sector that provide systems, services, and staff for the protection of persons and property
  1
 

Security, Computer -- See Computer Security


Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
  1
security Computer networks : Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner  2002 1
Security COMPUTER Online Safety & Privacy : Data Privacy : foundations, new developments and the big data challenge / Vicenc̦ Torra  2017 1
Security Computers : Network Security  2014 1
Security COMPUTERS Cryptography   137
Security COMPUTERS Cryptography & Encryption   5
Security Computers General   1728
Security COMPUTERS Internet   748
Security COMPUTERS Network Security   4
Security COMPUTERS Networking   903
Security COMPUTERS Online Safety & Privacy   40
Security COMPUTERS S Networking : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström  2012 1
Security COMPUTERS S Online Safety & Privacy : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström  2012 1
Security COMPUTERS Viruses   21
Security COMPUTERS Viruses & Malware   18
Security Conflict of laws   4
Security Conflict of laws European Union countries   3
security Congo-Kinshasa defence : Supporting SSR in the DRC between a rock and a hard place : an analysis of the donor approach to supporting security sector reform in the Democratic Republic of Congo / Henri Boshoff ..  2010 1
 

Security consultants -- See Also Private security services


Here are entered works on organizations outside the public sector that provide systems, services, and staff for the protection of persons and property
  1
Security consultants.   9
Security consultants -- Australia.   2
Security consultants -- Canada. : Powers of private security personnel : search and seizure : a study paper / prepared for the Law Reform Commission of Canada ; by Philip C. Stenning and Clifford D. Shearing  1979 1
Security consultants -- Handbooks, manuals, etc   3
Security consultants -- Law and legislation -- Canada. : Powers of private security personnel : search and seizure : a study paper / prepared for the Law Reform Commission of Canada ; by Philip C. Stenning and Clifford D. Shearing  1979 1
Security consultants -- Legal status, laws, etc. : From the files of a security expert witness / Charles A. Sennewald  2013 1
Security consultants -- Legal status, laws, etc. -- United States : From the files of a security expert witness / Charles A. Sennewald  2013 1
Security consultants -- Periodicals : Security (Newton, Mass. )  1986- 1
Security consultants -- South Africa : Managing security information : incidents, threats and vulnerabilities : a practical approach for security practitioners serving private and government entities in South Africa / Doraval Govender  2018 1
Security control Computer networks : Windows Server 2003 networking recipes / Robbie Allen, Laura E. Hunter, and Bradley J. Dinerman  2006 1
security cooperation. : EU-Japan Security Cooperation : Trends and Prospects / Emil J. Kirchner, Han Dorussen  2018 1
Security Council.   11
Security Council UN civil wars : United Nations Security Council and civil war first insights from a new dataset / James Cockayne, Christoph Mikulaschek, and Chris Perry  2010 1
Security Council UN conflict prevention : The UN Security Council and conflict prevention a primer  2011 1
Security Council United Nations   2
 

Security, Cyber -- See Computer Security


Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
  1
 

Security, Data -- See Computer Security


Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
  1
Security Design.   2
Security Design ARCHITECTURE   93
 

Security, Economic -- See Economic security


  1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next