Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
41
-
42
-
43
-
44
-
45
-
46
-
47
-
48
-
49
Decentralizing security architecture: evaluating federalism’s role in enhancing security frameworks in Nigeria
Published 2024-06-01Subjects: Get full text
Article -
50
Security architecture to support multiple security policies based on access control space
Published 2006-01-01Subjects: “…security architecture…”
Get full text
Article -
51
Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities
Published 2004-10-01“… This document describes nine features that specifically promote pesticide storage facility security and safety. This document is Fact Sheet PI-32, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
52
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
Published 2013-08-01Subjects: Get full text
Article -
53
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: “…Network security…”
Get full text
Article -
54
Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities
Published 2004-10-01“… This document describes nine features that specifically promote pesticide storage facility security and safety. This document is Fact Sheet PI-32, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
55
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks
Published 2013-04-01“…In 2009, according to Arjan Durresi and Vamsi Paruchuri scheme, this unique ability is used to provide better authentication and security protocols that can be used to establish secure communications among cell phones and sensor networks. …”
Get full text
Article -
56
Towards a Human Security-Oriented Conception of Public Security in the Context of Globalization
Published 2014-01-01Get full text
Article -
57
Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication
Published 2021-09-01“…Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance optimization of interconnected security control based on semantic security analysis of process communication was proposed.The interaction model of master-slave processes was described in a parallel programming language in the method.The state transition system semantics were given to accurately express the combined semantics of the master-slave processes.The security of master-slave processes in combinatorial semantics was analyzed, which ensured that the parallel running of processes had no deadlock and starvation, and was equivalent to the original regular matching.Experimental results showed that the proposed method could give full play to the advantages of multi-core hardware and reduced the context switching overhead of the scheduler.In the case of complex regular expressions, the method was an order of magnitude better than single-core running.…”
Get full text
Article -
58
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
59
FEATURES OF FORMATION AND DEVELOPMENT OF THE COMMON MARKET OF MORTGAGE LENDING IN THE EUROPEAN UNION
Published 2016-10-01Subjects: Get full text
Article -
60
TO A QUESTION OF DEVELOPMENT OF THE MAIN DIRECTIONS OF OPTIMUM POLICY OF BANK
Published 2017-03-01Subjects: “…portfolio of securities…”
Get full text
Article