Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
221
Impact of Livelihood Diversification on Rural Households’ Food and Nutrition Security: Evidence from West Shoa Zone of Oromia Regional State, Ethiopia
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
222
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
223
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
224
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
225
Open platform and key technology of mobile application security depth detection capability
Published 2018-03-01Subjects: “…mobile application security…”
Get full text
Article -
226
Enhancing food and nutrition security in Himalayan foothills with neglected and underutilized millets
Published 2025-01-01Subjects: “…Food security…”
Get full text
Article -
227
Improvement of the conceptual principles of activity of the Ministry of Internal Affairs of Ukraine as a subject of the formation and development of the internal security environme...
Published 2024-06-01Subjects: “…security environment…”
Get full text
Article -
228
SIM: a secure IP protocol for MANET
Published 2013-08-01Subjects: “…secure IP protocol for manet…”
Get full text
Article -
229
THE THEORY OF ECONOMIC SECURITY IN THE CONTEXT OF THE ACHIEVEMENTS OF DIFFERENT ECONOMIC SCHOOLS
Published 2016-07-01Subjects: “…economic security…”
Get full text
Article -
230
Evolution of Theoretical Approaches to the Study of Debt Security
Published 2024-06-01Subjects: “…debt security…”
Get full text
Article -
231
Host security assessment method based on attack graph
Published 2022-02-01Subjects: “…host security…”
Get full text
Article -
232
A health security-based framework for prioritizing regions for digital learning in complex health emergencies
Published 2025-01-01Subjects: Get full text
Article -
233
-
234
-
235
Investigating the relationship between the sense of belonging to the place and the level of social security of citizens - Case study: Qom-
Published 2021-06-01Subjects: “…security…”
Get full text
Article -
236
Analysis of cyberspace security based on game theory
Published 2015-12-01Subjects: “…cyberspace security…”
Get full text
Article -
237
Anarchy Is What Explains the History of International Relations
Published 2019-03-01Subjects: Get full text
Article -
238
Entre incompréhension et intérêt national
Published 2011-06-01Subjects: “…security…”
Get full text
Article -
239
Security: Exploring Alternative Methods in Curbing Security Challenges in Nigeria
Published 2022-11-01Subjects: “…Security…”
Get full text
Article -
240
Organizational Flexibility and Financial Performance: A Case Study of Social Security Branches in Tehran
Published 2021-05-01Subjects: Get full text
Article