Showing 41 - 60 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 41
  2. 42

    CYBER SECURITY INVESTMENT by Dujam Kovač

    Published 2021-07-01
    Subjects: “…cyber security…”
    Get full text
    Article
  3. 43

    Study on Security in SDN by Sujing Zhou

    Published 2013-09-01
    Subjects:
    Get full text
    Article
  4. 44

    The urban security project by Roberto Bolici, Matteo Gambaro

    Published 2020-06-01
    Subjects: “…urban security…”
    Get full text
    Article
  5. 45
  6. 46
  7. 47

    Define cyberspace security by Binxing FANG

    Published 2018-01-01
    Subjects:
    Get full text
    Article
  8. 48
  9. 49
  10. 50
  11. 51

    Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities by Thomas W. Dean

    Published 2004-10-01
    “… This document describes nine features that specifically promote pesticide storage facility security and safety. This document is Fact Sheet PI-32, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  12. 52
  13. 53
  14. 54

    Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities by Thomas W. Dean

    Published 2004-10-01
    “… This document describes nine features that specifically promote pesticide storage facility security and safety. This document is Fact Sheet PI-32, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  15. 55

    Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks by Ndibanje Bruce, Tae-Yong Kim, Hoon Jae Lee

    Published 2013-04-01
    “…In 2009, according to Arjan Durresi and Vamsi Paruchuri scheme, this unique ability is used to provide better authentication and security protocols that can be used to establish secure communications among cell phones and sensor networks. …”
    Get full text
    Article
  16. 56
  17. 57

    Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication by Bo LU, Yueming LU

    Published 2021-09-01
    “…Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance optimization of interconnected security control based on semantic security analysis of process communication was proposed.The interaction model of master-slave processes was described in a parallel programming language in the method.The state transition system semantics were given to accurately express the combined semantics of the master-slave processes.The security of master-slave processes in combinatorial semantics was analyzed, which ensured that the parallel running of processes had no deadlock and starvation, and was equivalent to the original regular matching.Experimental results showed that the proposed method could give full play to the advantages of multi-core hardware and reduced the context switching overhead of the scheduler.In the case of complex regular expressions, the method was an order of magnitude better than single-core running.…”
    Get full text
    Article
  18. 58
  19. 59
  20. 60

    TO A QUESTION OF DEVELOPMENT OF THE MAIN DIRECTIONS OF OPTIMUM POLICY OF BANK by A. Zinchenko

    Published 2017-03-01
    Subjects: “…portfolio of securities…”
    Get full text
    Article