Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
41
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: “…Network security…”
Get full text
Article -
42
Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities
Published 2004-10-01“… This document describes nine features that specifically promote pesticide storage facility security and safety. This document is Fact Sheet PI-32, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
43
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks
Published 2013-04-01“…In 2009, according to Arjan Durresi and Vamsi Paruchuri scheme, this unique ability is used to provide better authentication and security protocols that can be used to establish secure communications among cell phones and sensor networks. …”
Get full text
Article -
44
Towards a Human Security-Oriented Conception of Public Security in the Context of Globalization
Published 2014-01-01Get full text
Article -
45
Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication
Published 2021-09-01“…Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance optimization of interconnected security control based on semantic security analysis of process communication was proposed.The interaction model of master-slave processes was described in a parallel programming language in the method.The state transition system semantics were given to accurately express the combined semantics of the master-slave processes.The security of master-slave processes in combinatorial semantics was analyzed, which ensured that the parallel running of processes had no deadlock and starvation, and was equivalent to the original regular matching.Experimental results showed that the proposed method could give full play to the advantages of multi-core hardware and reduced the context switching overhead of the scheduler.In the case of complex regular expressions, the method was an order of magnitude better than single-core running.…”
Get full text
Article -
46
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
47
Extension of the basic Global Health Security (GHS) index: Health system security indicator
Published 2021-01-01“…The paper discusses the extension of the Global Health Security (GHS) index with new non-medical predictors: Gross Domestic Product (GDP) per capita as a basic indicator of economic growth, Corruption Perception Index (CPI) and Democracy Index (DI) as significant indicators of social relations. …”
Get full text
Article -
48
Personnel training for the security and defense sector as a prerequisite for ensuring the national security of Ukraine
Published 2021-09-01Subjects: “…security and defense sector…”
Get full text
Article -
49
Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium
Published 2015-01-01“…Stackelberg Security considerably improves the strength of solution with higher security.…”
Get full text
Article -
50
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
51
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
52
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
53
Humanitarian NGOs, (in)Security and Identity : epistemic communities and security governance /
Published 2015Table of Contents: “…Acknowledgements -- Abbreviations -- Introduction -- Humanitarian NGOs and their identity(ies) in the light of recent and ongoing changes -- Humanitarian NGOs' responses to insecurity -- Epistemic communities and the institutionalization, professionalization and standardization of humanitarian NGO security management -- From experience-based trust to identity-based trust -- Conclusion -- References.…”
View in OPAC
Book -
54
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
55
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
56
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book -
57
-
58
-
59
-
60