Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 5
- Computer networks 4
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1
Security Implications of the Anthropology of Āyatullāh Jawādī Amulī
Published 2011-09-01Subjects: “…security models…”
Get full text
Article -
2
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Published 2022-01-01Subjects: “…Security…”
Get full text
Article -
3
Economic security of Ukrainian regions: pre-war and war periods
Published 2024-12-01Subjects: “…innovation security…”
Get full text
Article -
4
Security and its Political Threats in a Theoretical Perspective
Published 2020-12-01Subjects: “…security…”
Get full text
Article -
5
Overview and prospect of 5G security
Published 2020-12-01Subjects: “…5G security…”
Get full text
Article -
6
The legal issues of the substantiation of new types of national security
Published 2020-07-01Subjects: “…security…”
Get full text
Article -
7
IMPACT OF FLOODING ON HUMAN SECURITY IN NORTHERN NIGERIA
Published 2024-10-01Subjects: Get full text
Article -
8
Surveying the ethical dimensions of international security from the perspective of Ayatollah Javadi Amoli
Published 2014-09-01Subjects: “…security…”
Get full text
Article -
9
INFORMATION SAFETY AS A FACTOR OF NATIONAL SAFETY AND COMPETITIVE ABILITY OF THE STATE
Published 2022-08-01Subjects: “…security…”
Get full text
Article -
10
Multi-Level Cloud Datacenter Security Using Efficient Hybrid Algorithm
Published 2023-12-01Subjects: “…cloud security…”
Get full text
Article -
11
Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild
Published 2024-01-01Subjects: Get full text
Article -
12
Security environment of the state in the context of the Ministry of Internal Affairs of Ukraine activities
Published 2023-06-01Subjects: “…security…”
Get full text
Article -
13
Human resources security as an element of economic security in region
Published 2018-06-01Subjects: “…personnel security…”
Get full text
Article -
14
Security Protection of Electrical Intelligent Sensors and Sensor Networks
Published 2023-11-01Subjects: Get full text
Article -
15
Multilevel Database Security for Android Using Fast Encryption Methods
Published 2022-06-01Subjects: “…multilevel security…”
Get full text
Article -
16
A comprehensive survey on 6G-security: physical connection and service layers
Published 2025-03-01Subjects: “…6G security…”
Get full text
Article -
17
Global Supply Chains Made Visible through Logistics Security Management
Published 2024-01-01Subjects: “…supply chain security…”
Get full text
Article -
18
Russo-Ukrainian War’s Impact on Space Security – The Western Perspective
Published 2024-12-01Subjects: Get full text
Article -
19
Zero Trust Cybersecurity: Procedures and Considerations in Context
Published 2024-10-01Subjects: Get full text
Article -
20