Academic literature on the topic 'Airports – Security measures – United States'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Airports – Security measures – United States.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Airports – Security measures – United States"
Radomyski, Adam. "DIAGNOSIS OF THE CIVIL AVIATION PROTECTION SYSTEM AGAINST TERRORIST ATTACKS IN THE UNITED STATES." Rocznik Bezpieczeństwa Morskiego XIII (January 24, 2020): 2–3. http://dx.doi.org/10.5604/01.3001.0013.7487.
Full textFain, Stacie L. "2025." International Journal of Aviation Systems, Operations and Training 1, no. 1 (January 2014): 9–16. http://dx.doi.org/10.4018/ijasot.2014010102.
Full textSTEZHKO, S., and T. SHEVCHENKO. "Current US experience in cyber security." INFORMATION AND LAW, no. 2(37) (June 23, 2021): 139–44. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238349.
Full textEichler, Rose Richerson. "Cybersecurity, Encryption, and Defense Industry Compliance with United States Export Regulations." Texas A&M Journal of Property Law 5, no. 1 (October 2018): 5–36. http://dx.doi.org/10.37419/jpl.v5.i1.2.
Full textStewart, Mark G., and John Mueller. "A risk and cost-benefit assessment of United States aviation security measures." Journal of Transportation Security 1, no. 3 (May 30, 2008): 143–59. http://dx.doi.org/10.1007/s12198-008-0013-0.
Full textRoach, Ashley. "Container and Port Security: A Bilateral Perspective." International Journal of Marine and Coastal Law 18, no. 3 (2003): 341–61. http://dx.doi.org/10.1163/092735203770223576.
Full textJohnson, Letitia. "Gender and Medical Inspections at Ellis Island." Constellations 7, no. 1 (January 10, 2016): 15. http://dx.doi.org/10.29173/cons27053.
Full textRamsay, William C. "The United States and World Energy Markets." Energy Exploration & Exploitation 10, no. 2 (April 1992): 89–95. http://dx.doi.org/10.1177/014459879201000204.
Full textAdebiaye, Richmond, and Taiwo Ajani. "INFORMATION TECHNOLOGY USAGE: QUANTITATIVE ANALYSIS OF SMARTPHONE SECURITY AWARENESS AND PRACTICES AMONG UNDERGRADUATE STUDENTS IN THE UNITED STATES." International Journal of Engineering Technologies and Management Research 5, no. 3 (February 16, 2020): 270–84. http://dx.doi.org/10.29121/ijetmr.v5.i3.2018.201.
Full textSignoret, José E. "On Cargo Security Measures and Trade Costs." Global Economy Journal 11, no. 3 (September 2011): 1850234. http://dx.doi.org/10.2202/1524-5861.1733.
Full textDissertations / Theses on the topic "Airports – Security measures – United States"
Churchward, Charles E. "What practices in airport security should the United States implement at commercial airports in light of the events of September 11, 2001?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5fChurchward.pdf.
Full textGuild, Jennifer. "Scripting quality of security service (QoSS) safeguard measures for the suggested INFOCON System /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FGuild%5FJennifer.pdf.
Full textWells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Full textYalcinkaya, Ramazan. "Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4801/.
Full textStocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.
Full textRamirez, Christina M. "Water security and its importance in protecting public health." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/820.
Full textOsburn, Toby W. "Hazard mitigation and disaster preparedness planning at American Coastal University: Seeking the disaster-resistant university." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9745/.
Full textHelton, Jennifer L. "The effects of the September 11th attacks on security measures of collegiate football operations." Virtual Press, 2004. http://www.oregonpdf.org.
Full textGivens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.
Full textTitle from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
Hart, Dennis. "An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHart.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
Books on the topic "Airports – Security measures – United States"
United States. General Accounting Office. RCED. Aviation security: Posting notices at domestic airports. Washington, D.C: The Office, 1997.
Find full textUnited States. Congress. House. Committee on Government Operations. FAA regulation of security at major U.S. airports: Thirty-ninth report. Washington: U.S. G.P.O., 1988.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. Has airport security improved?: Joint hearing before the Committee on Governmental Affairs, United States Senate and the Oversight of Government Management, Restructuring, and the District of Columbia Subcommittee, One Hundred Seventh Congress, first session, November 14, 2001. Washington: U.S. G.P.O., 2002.
Find full textMead, Kenneth M. Proactive management of FAA's security program needed: Statement of Kenneth M. Mead, director, Transportation Issues, Resources, Community, and Economic Development Division, before the President's Commission on Aviation Security and Terrorism. [Washington, D.C.?]: U.S. General Accounting Office, 1989.
Find full textMali. Aviation, security: Agreement between the United States of America and Mali, signed at Bamako June 25, 1993. Washington, D.C: Dept. of State, 1996.
Find full textRCED, United States General Accounting Office. Aviation security. Washington, D.C: The Office, 1994.
Find full textOffice, United States Government Accountability. Transportation security: DHS should address key challenges before implementing the transportation worker identification credential program : report to congressional requesters. Washington, D.C: GAO, 2006.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Aviation. Aviation security: Hearing before the Subcommittee on Aviation of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred First Congress, first session, on aviation security, April 13, 1989. Washington: U.S. G.P.O., 1989.
Find full textThe state of aviation security: Is our current system capable of meeting the threat? : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, January 20, 2010. Washington: U.S. G.P.O., 2010.
Find full textUnited States. Congress. House. Committee on Government Operations. Passenger security at Dulles International Airport: FAA oversight : sixty-fourth report. Washington: U.S. G.P.O., 1986.
Find full textBook chapters on the topic "Airports – Security measures – United States"
Accaoui Lorfing, Pascale. "Screening of Foreign Direct Investment and the States’ Security Interests in Light of the OECD, UNCTAD and Other International Guidelines." In Public Actors in International Investment Law, 179–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-58916-5_10.
Full textFain, Stacie L. "2025." In Civil and Environmental Engineering, 1663–70. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9619-8.ch076.
Full textStebenne, David. "Social Welfare in the United States, 1945–1960." In The Liberal Consensus Reconsidered. University Press of Florida, 2017. http://dx.doi.org/10.5744/florida/9780813054261.003.0007.
Full textKreuder-Sonnen, Christian. "Emergency Powers of the UN Security Council." In Emergency Powers of International Organizations, 81–116. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198832935.003.0004.
Full textMcNeal, Ramona Sue, and Mary Schmeida. "Digital Paranoia." In Cyber Law, Privacy, and Security, 1295–312. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch064.
Full textGupta, Manish, JinKyu Lee, and H. R. Rao. "Implications of FFIEC Guidance on Authentication in Electronic Banking." In Handbook of Research on Information Security and Assurance, 266–78. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch022.
Full textHarcourt, Alison, George Christou, and Seamus Simpson. "Protocols and State Surveillance." In Global Standard Setting in Internet Governance, 157–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198841524.003.0009.
Full textPartow-Navid, Parviz, and Ludwig Slusky. "IT Security Policy in Public Organizations." In Information Security and Ethics, 2745–54. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch183.
Full textMusa, WeSam. "Cybercrimes Technologies and Approaches." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 193–210. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch013.
Full textNeumann, Franz. "The Treatment of Germany." In Secret Reports on Nazi Germany. Princeton University Press, 2013. http://dx.doi.org/10.23943/princeton/9780691134130.003.0025.
Full textConference papers on the topic "Airports – Security measures – United States"
Feng, Ran. "Enlightenment of Cross-Border Data Security and Personal Privacy Protection Measures of Europe and the United States for China." In AICS 2019: 2019 International Conference on Artificial Intelligence and Computer Science. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349341.3349514.
Full textHayes, Jan, Lynne Chester, and Dolruedee Kramnaimuang King. "Is Public Safety Impacted by the Multiple Regulatory Regimes for Gas Pipelines and Networks?" In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78160.
Full text