Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
761
Assessing National and Military Security of Russia: Established Procedure and How to Improve It
Published 2020-11-01Subjects: “…national security…”
Get full text
Article -
762
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01Subjects: Get full text
Article -
763
INTERNAL CONTROL AS A TOOL OF SUPPORT ECONOMIC SECURITY OF THE ORGANIZATION AT THE MICRO LEVEL
Published 2021-04-01Subjects: Get full text
Article -
764
Strategic Nuclear and Non-Nuclear Deterrence in Russia’s National Security Policy
Published 2025-02-01Subjects: Get full text
Article -
765
Logistic Infrastructure, Informational Technology and Crop Production: Role of Food and Crop Production in Economic Miseries
Published 2024-12-01Subjects: Get full text
Article -
766
The Role of the Commercial Space Industry within the US National Security under the Trump Administration
Published 2021-04-01Subjects: Get full text
Article -
767
Uniting Africa : building regional peace and security systems /
Published 2006Subjects: Table of contents only
View in OPAC
Book -
768
Composable information flow verification for service chain based on model checking
Published 2014-11-01Subjects: Get full text
Article -
769
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
770
“ADAPTING TO A CHANGING WORLD: STRATEGIES FOR MITIGATING THE GLOBAL CONSEQUENCES OF CLIMATE CHANGE”
Published 2024-10-01Subjects: Get full text
Article -
771
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01Subjects: “…network security…”
Get full text
Article -
772
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: “…data security…”
Get full text
Article -
773
Research on structure and defense of adversarial example in deep learning
Published 2020-04-01Subjects: Get full text
Article -
774
Characteristics of security risks of large industrial investments and their management principles
Published 2025-01-01Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
Get full text
Article -
775
ADAPTING TO A CHANGING WORLD: STRATEGIES FOR MITIGATING THE GLOBAL CONSEQUENCES OF CLIMATE CHANGE
Published 2024-09-01Subjects: Get full text
Article -
776
Development of face image recognition algorithm using CNN in airport security checkpoints for terrorist early detection
Published 2025-01-01Subjects: “…airport security…”
Get full text
Article -
777
-
778
Sensitive information filtering based on kernel method
Published 2008-01-01Subjects: Get full text
Article -
779
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article -
780
Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
Published 2014-07-01Subjects: Get full text
Article