To see the other types of publications on this topic, follow the link: LTE Security.

Books on the topic 'LTE Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'LTE Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

LTE security. Hoboken, N.J: Wiley, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118380642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470973271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pustovoĭ, Valeriĭ. Zvezdochki prozhitykh let. Cheli︠a︡binsk: Izd-vo Tatʹi︠a︡ny Lurʹe, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Michael, Eisenstadt, and Bacevich A. J, eds. Knives, tanks, and missiles: Israel's security revolution. Washington, DC: Washington Institute for Near East Policy, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

White, Jonathan Randall. Terrorism and homeland security. 6th ed. Belmont, CA: Wadsworth Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Terrorism and homeland security. 5th ed. Australia: Thomson Wadsworth, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cerexhe, Peter. It's never too late: To achieve financial security - start today. Crows Nest, N.S.W: Allen & Unwin, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peterson, Richard Lewis. The real social security problem: What everyone must know before it is too late. Lubbock, Tex: Financial Economics Publications, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Skinner, Kiron K. Executive and Congressional use of security linkage during the late 1970s. Santa Monica, CA (1700 Main St., P.O. Box 2138, Santa Monica 90407-2138): RAND, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

H, Etzold Thomas, ed. Future imperative: National security and the U.S. Navy in the late 1980s. Washington, D.C: Center for Strategic and International Studies, Georgetown University, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

A, Churkin S., ed. Spet︠s︡sluzhby Rossii za 1000 let: Materialy sekretnykh fondov. Moskva: Ripol klassik, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Andrew, Douglas R. The last chance millionaire: It's not too late to become wealthy. New York: Business Plus, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bach, David. Start Late, Finish Rich. New York: Broadway Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

European Court of Human Rights. Affaire Observer et Guardian c. Royaume-uni: Décision du 21 Mars 1991 (dessaissement) : arrêt du 26 Novembre 1991 = Case of the Observer and Guardian v. the United Kingdom = decision of 21 March 1991 (relinguishment of jurisdiction) : judgment of 26 November 1991. Strasbourg: Greffe de la Cour, Conseil de l'Europe, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Abramochkin, A. D. 60 let vnevedomstvennoĭ okhrane. Moskva: "IPK Robin", 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Conrad, Burkhard. Small arms transfers & disarmament: A security leitmotif for Tajikistan in the late 1990s? Camberley: Conflict Studies Research Centre, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bunch, Chris. The dog from hell: A Star Risk, Ltd., novel. New York: Roc, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Andrew, Douglas R. The last chance millionaire: It's not too late to become wealthy. New York: Warner Business Books, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

United States. Congress. Senate. Committee on the Judiciary. Issues surrounding the use of polygraphs: Hearing before the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, April 25, 2001. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

P, Purpura Philip. Security and loss prevention: An introduction. 5th ed. Burlington, MA: Elsevier/Butterworth-Heinemann, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Security and loss prevention: An introduction. 4th ed. Boston: Butterworth-Heinemann, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

P, Purpura Philip. Security and loss prevention: An introduction. 5th ed. Burlington, MA: Elsevier/Butterworth-Heinemann, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Security and loss prevention: An introduction. 2nd ed. Boston: Butterworth-Heinemann, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

P, Purpura Philip. Security and loss prevention: An introduction. 3rd ed. Boston, MA: Butterworth-Heinemann, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bunch, Chris. The scoundrel worlds: A Star Risk, ltd., novel. New York: Roc, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Bill, Keep, ed. Customer fraud and business responses: Let the marketer beware. Westport, Conn: Quorum Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

MacWilliam, Scott. Securing Village Life: Development in Late Colonial Papua New Guinea. Canberra: ANU Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sutcliffe, Lesley. Let them eat coal: The political use of social security during the miners' strike. London: Canary Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Robertson, A. Haeworth. The big lie: What every baby boomer should know about social security and medicare. Washington, D.C: Retirement Policy Institute, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ṭalmor, Roni. The use of firearms by the security forces in the occupied territories. Jerusalem: B'tselem, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shulʹt︠s︡, V. L. Akademii︠a︡ FSB Rossii: 80 let. Moskva: Rusʹ, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Fen lie yu zheng he: She hui bao zhang di qu cha yi yu zhuan yi zhi fu yan jiu = Cleavage and integration : research on the regional disparity of social security and its fiscal transfer. Beijing: Zhongguo she hui ke xue chu ban she, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kanukova, Z. V. (Zalina Vladimirovna), Krylov, A. B. (Aleksandr Borisovich), and Kusraev A. G, eds. Kavkaz spusti︠a︡ 20 let: Geopolitika i problemy bezopasnosti, trudy mezhdunarodnoĭ nauchnoĭ konferent︠s︡ii, Vladikavkaz-T︠S︡khinval, 20-30 ii︠u︡ni︠a︡ 2011 g. Vladikavkaz: Vladikavkazskiĭ nauchnyĭ t︠s︡entr, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Goni︠u︡khov, S. O. MVD Rossii: 200 let na strazhe zakona i pravopori︠a︡dka. Moskva: Reĭttarʺ, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Alan, Zipḳin, and Mosad le-viṭuaḥ leʼumi. Minhal ha-meḥḳar ṿeha-tikhnun., eds. Hafʻalat ḥoḳ biṭuaḥ siʻud, 1992. Yerushalayim: ha-Mosad le-viṭuaḥ leʼumi, Minhal ha-meḥḳar ṿeha-tikhnun, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Alan, Zipḳin, and Mosad le-viṭuaḥ leʼumi. Minhal ha-meḥḳar ṿeha-tikhnun., eds. Hafʻalat ḥoḳ biṭuaḥ siʻud, 1993. Yerushalayim: ha-Mosad le-viṭuaḥ leʼumi, Minhal ha-meḥḳar ṿeha-tikhnun, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Alan, Zipḳin, and Morginstin Brenda, eds. Hafʻalat ḥoḳ biṭuaḥ siʻud: Sikum netunim me-April 1989 ʻad Merts 1990. Yerushalayim: ha-Mosad le-viṭuaḥ leʼumi, Minhal ha-meḥḳar ṿeha-tikhnun, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Śarit, Baits-Moraʼi, ed. Hafʻalat ḥoḳ biṭuaḥ siʻud: Sikum netunim me-April 1990 ʻad Merts 1991. Yerushalayim: ha-Mosad le-viṭuaḥ leʼumi, Minhal ha-meḥḳar ṿeha-tikhnun, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Zipḳin, Alan. Hafʻalat ḥoḳ biṭuaḥ siʻud: Sikum netunim me-April 1991 ʻad Detsember 1991. Yerushalayim: ha-Mosad le-viṭuaḥ leʼumi, Minhal ha-meḥḳar ṿeha-tikhnun, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Yalnizyan, Armine. Defining social security, defining ourselves: Why we need to change our thinking before it's too late. Ottawa: Canadian Centre for Policy Alternatives in co-operation with the Social Planning Council of Metropolitan Toronto and the Canadian Labour Congress, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ḳimḥi, Yuval. Tefisat biṭḥon ha-penim shel ha-Miśrad le-viṭḥon ha-penim : Ha-im hi reʼalit ba-metsiʻut ha-Yiśreʼelit? Tel Aviv: ha-Merkaz le-meḥḳar asṭraṭegi, ha-Mikhlalah le-viṭaḥon leʼumi, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

name, No. Advancing human security and development in Africa: Reflections on NEPAD. Halifax, NS: Centre for Foreign Policy Studies, Dalhousie University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lte Security NsnNokia. John Wiley & Sons, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Prasad, Anand R., and Seung-Woo Seo. Security in Next Generation Mobile Networks: SAE/LTE and Wimax. River Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Salton, Herman T. Security Council. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198733591.003.0006.

Full text
Abstract:
This chapter looks at the decision-making process of the Security Council on Rwanda and considers its most visible conundrum: why did states unanimously decide to reduce UNAMIR in late April 1994, only to reverse their position in early May? The chapter addresses this question by considering the Council’s informal (or secret) consultations of April and May 1994 and by assessing them alongside the recollections of UN officials (including the SG’s Special Representative to the Council) and the Goulding Archive. In so doing, the chapter questions a number of assumptions about the Rwandan crisis: that the SC was united in its opposition to the peacekeeping mission; that states only pursued their national interests; and that the Secretariat had no influence over the Council.
APA, Harvard, Vancouver, ISO, and other styles
47

French, Derek. 11. Borrowing and security. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198815105.003.0011.

Full text
Abstract:
This chapter considers borrowing as an important method of financing a company’s activities, and security as a right of recourse against company property if the loan is not repaid on time. It begins by discussing security for financial obligations, paying particular attention to security contracts, the redemption or discharge of security and the realisation of security. It then turns to the registration of non-possessory security contracts, the priorities of legal and equitable charges and floating charges as a form of security and their crystallisation. The extent to which the assets of a company to which anyone is considering extending credit are already charged as security is also explained. The chapter considers three particularly significant court cases: Evans v Rival Granite Quarries Ltd [1910] 2 KB 979; Re Spectrum Plus Ltd [2005] UKHL 41, [2005] 2 AC 680; and Re Yorkshire Woolcombers Association Ltd [1903] 2 Ch 284.
APA, Harvard, Vancouver, ISO, and other styles
48

French, Derek, Stephen W. Mayson, and Christopher L. Ryan. 11. Borrowing and security. Oxford University Press, 2016. http://dx.doi.org/10.1093/he/9780198778301.003.0011.

Full text
Abstract:
This chapter considers borrowing as an important method of financing a company’s activities and security as a right of recourse against company property if the loan is not repaid on time. It begins by discussing security for financial obligations, paying particular attention to security contracts, the redemption or discharge of security, and the realisation of security. It then turns to the registration of non-possessory security contracts, the priorities of legal and equitable charges, and floating charges as a form of security and their crystallisation. The extent to which the assets of anyone considering extending credit to a company are already charged as security is also explained. The chapter considers three particularly significant court cases: Evans v Rival Granite Quarries Ltd [1910] 2 KB 979; Re Spectrum Plus Ltd [2005] UKHL 41, [2005] 2 AC 680; and Re Yorkshire Woolcombers Association Ltd [1903] 2 Ch 284.
APA, Harvard, Vancouver, ISO, and other styles
49

Pucci, Molly. Security Empire. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300242577.001.0001.

Full text
Abstract:
The secret police were one of the most important institutions in the making of communist Eastern Europe. Security Empire compares the early history of secret police institutions, which were responsible for foreign espionage, domestic surveillance, and political violence in communist states, in Poland, Czechoslovakia, and East Germany after the Second World War. While previous histories have assumed that these forces were copies of the Soviet model, the book delves into the ways their origins diverged due to local social conditions, languages, and interpretations of communism. It illuminates the internal tensions inside the forces, between veteran agents who had fought in wars in Spain and Germany, and the younger, more radical agents, who pushed forward the violence, arrests, and show trials inside Eastern European communist parties in the late 1940s and early 1950s. In doing so, the book traces the role of political violence, ideological belief, and surveillance in building communist institutions in Europe by the mid-1950s.
APA, Harvard, Vancouver, ISO, and other styles
50

Ravndal, Ellen Jenny. Trygve Lie, 1946–1953. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198748915.003.0002.

Full text
Abstract:
This chapter explores all aspects of Trygve Lie’s interaction with the Security Council, beginning with his appointment process and the negotiation of the relative domains of the Council and the Secretary-General. This was a time when the working methods of the UN system were rapidly evolving through political negotiation and responses to external crises. It examines Lie’s personality and character, how he viewed his own responsibilities in the maintenance of international peace and security as crises arose, the legal and political tools he developed and exercised, and his changing relationship with individual permanent members and the six elected members. In the emerging Cold War, Lie’s position in the Security Council would be determined in particular by his relationships with the United States and the Soviet Union. Taking initiative in response to external crises in Iran, Palestine, Berlin, and Korea, Lie succeeded in laying foundations for an expanded political role for the Secretary-General.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography