Academic literature on the topic 'Methods of protection and defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Methods of protection and defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Methods of protection and defence"
Khisamova, R. V. "Digital (Self)-Defence by The Example of The Children’s Rights Protection." Theoretical and Applied Law, no. 3 (October 8, 2024): 87–95. http://dx.doi.org/10.22394/3034-2813-2024-3-87-95.
Full textLoo, Bee Wah, Pei Ling Tan, Siew Kian Tey, and Wan Yoke Chin. "Authentication Methods Selection in Information Security through Hybrid AHP and EGT." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 2 (2024): 171–85. http://dx.doi.org/10.37934/araset.50.2.171185.
Full textHarmata, Władysław, and Marek Witczak. "Defence against weapons of mass destruction. Technical and functional solutions in personal protection for Territorial Defence Forces." Bulletin of the Military University of Technology 67, no. 2 (2018): 145–68. http://dx.doi.org/10.5604/01.3001.0012.0984.
Full textNemailal, Tarafder. "Defence Textiles Types with Materials and Methods of Manufacturing-A Review." Journal of Industrial Mechanics 4, no. 2 (2019): 25–33. https://doi.org/10.5281/zenodo.3361358.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.
Full textSHYSHKA, Y. "Protection of human rights and freedoms in the information sphere." INFORMATION AND LAW, no. 1(10) (January 10, 2014): 101–5. http://dx.doi.org/10.37750/2616-6798.2014.1(10).272433.
Full textMelnyk, Dmytro. "PROTECTION OF NATIONAL CRITICAL INFORMATION INFRASTRUCTURE: ISSUES OF THE DAY AND SOLUTIONS." Administrative law and process, no. 3(38) (2022): 5–16. http://dx.doi.org/10.17721/2227-796x.2022.3.01.
Full textStochaj, Justyna. "Outline of the Concept of the Population Protection and Civil Defence System in the Context of Contemporary Statutory Regulations." Safety & Fire Technology 65, no. 1 (2025): 42–54. https://doi.org/10.12845/sft.65.1.2025.4.
Full textMykhailovskyi, Denys, and Ihor Skliarov. "Methods of calculation and engineering protection of critical infrastructure objects and other strategic facilities against long-range projectiles." Strength of Materials and Theory of Structures, no. 111 (November 24, 2023): 155–71. http://dx.doi.org/10.32347/2410-2547.2023.111.155-171.
Full textDissertations / Theses on the topic "Methods of protection and defence"
Flucke, Josefine. "Architecture of defence, preservation of life." Master's thesis, Universidade de Lisboa, Faculdade de Arquitetura, 2019. http://hdl.handle.net/10400.5/19074.
Full textSimpson, Katherine Hannah. "Public choice for flood defence." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22596.
Full textBorysenkov, Dmytro, and Serhii Rozhok. "Features of national cyber defence." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50755.
Full textKarus, Vahur. "Statemaking, warmaking och protection ur Estlands perspektiv." Thesis, Försvarshögskolan, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1209.
Full textUnnikrishnan, Suraj. "Adaptive Envelope Protection Methods for Aircraft." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11478.
Full textAderam, Henry Ndejapo Tshapumba. "Consumer protection in online payment methods." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73435.
Full textKarlsson, Terése. "Contingency planning for Bofors Defence AB, an application of existing methods." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1639.
Full textOrmondroyd, Graham A. "An investigation of novel wood protection methods." Thesis, Bangor University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.445093.
Full textSpivak, I. S., and L. P. Iarmak. "Methods of protection (pelleting) of nitrogen fertilizers." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28676.
Full textЯкушко, Сергій Іванович, Сергей Иванович Якушко, Serhii Ivanovych Yakushko, and I. S. Spivak. "Methods of protection (pelleting) of nitrogen fertilizers." Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25807.
Full textBooks on the topic "Methods of protection and defence"
Harries, Nicola Denise. Dawlish Warren, Devon: Changing shape and protection of the spit, with the use of coastal defence methods. Queen Mary and Westfield College, 1991.
Find full textTorsten, Sohns, Voicu Victor A, and NATO Advanced Research Workshop on Antidotes, Protectors, and Decorporators--a New Approach in the Area of Disarmament: From Military towards Environmental Purposes (1998 : Bucharest, Romania), eds. NBC risks: Current capabilities and future perspectives for protection. Kluwer Academic Publishers, 1999.
Find full textNational Council on Radiation Protection and Measurements. Radiological health protection issues associated with use of active detection technology systems for detection of radioactive threat materials. National Council on Radiation Protection and Measurements, 2011.
Find full textDeschaux-Dutard, Delphine, ed. Research Methods in Defence Studies. Routledge, 2020. http://dx.doi.org/10.4324/9780429198236.
Full textSoomere, Tarmo, and Ewald Quak, eds. Preventive Methods for Coastal Protection. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00440-2.
Full textOntario. Ministry of Agriculture and Food. Freeze Protection Methods For Crops. s.n, 1985.
Find full textJeschke, Peter, Wolfgang Krämer, Ulrich Schirmer, and Matthias Witschel, eds. Modern Methods in Crop Protection Research. Wiley-VCH Verlag GmbH & Co. KGaA, 2012. http://dx.doi.org/10.1002/9783527655908.
Full textVincent, Charles, B. Panneton, and F. Fleurat-Lessard, eds. Physical Control Methods in Plant Protection. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04584-8.
Full textMahdavi Tabatabaei, Naser, Ersan Kabalci, and Nicu Bizon, eds. Microgrid Architectures, Control and Protection Methods. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-23723-3.
Full text1959-, Butler Frances, and British Institute of Human Rights, eds. Human rights protection: Methods and effectiveness. Kluwer Law International, 2002.
Find full textBook chapters on the topic "Methods of protection and defence"
Ricci, Angela, Silvia Sabbadini, Laura Miozzi, Bruno Mezzetti, and Emanuela Noris. "Host-induced gene silencing and spray-induced gene silencing for crop protection against viruses." In RNAi for plant improvement and protection. CABI, 2021. http://dx.doi.org/10.1079/9781789248890.0008.
Full textRicci, Angela, Silvia Sabbadini, Laura Miozzi, Bruno Mezzetti, and Emanuela Noris. "Host-induced gene silencing and spray-induced gene silencing for crop protection against viruses." In RNAi for plant improvement and protection. CABI, 2021. http://dx.doi.org/10.1079/9781789248890.0072.
Full textKhudaverdyan, Surik, Ashok Vaseashta, Mane Khachatryan, Mihail Lapkis, and Sergey Rudenko. "New Method of Optical Spectroscopy for Environmental Protection and Safety." In Functional Nanostructures and Sensors for CBRN Defence and Environmental Safety and Security. Springer Netherlands, 2020. http://dx.doi.org/10.1007/978-94-024-1909-2_19.
Full textWuwang, Yanxiu, and Gunther Schiefer. "Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots." In Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21311-3_5.
Full textLehmann, Paul V., Zhigang Liu, Noémi Becza, Alexis V. Valente, Junbo Wang, and Greg A. Kirchenbaum. "Monitoring Memory B Cells by Next-Generation ImmunoSpot® Provides Insights into Humoral Immunity that Measurements of Circulating Antibodies Do Not Reveal." In Methods in Molecular Biology. Springer US, 2024. http://dx.doi.org/10.1007/978-1-0716-3690-9_11.
Full textBateman, I. J., R. K. Turner, R. J. T. Klein, and I. H. Langford. "The Application of the Cost Benefit Method to Sea Defence and Coastal Protection Management in England." In Studies in Ecological Economics. Springer Netherlands, 2001. http://dx.doi.org/10.1007/978-94-015-9755-5_5.
Full textReddy, P. Parvatha. "Plant Defence Activators." In Recent advances in crop protection. Springer India, 2012. http://dx.doi.org/10.1007/978-81-322-0723-8_9.
Full textKeay, Andrew. "The Wrongful Trading Defence." In Company Directors' Liability and Creditor Protection. Informa Law from Routledge, 2023. http://dx.doi.org/10.4324/9780429266232-13.
Full textDeschaux-Dutard, Delphine. "Methods In Defence Studies." In Routledge Handbook Of Defence Studies. Routledge, 2018. http://dx.doi.org/10.4324/9781315650463-5.
Full textMillan, Matteo. "From “state protection” to “private defence”." In Corporate Policing, Yellow Unionism, and Strikebreaking, 1890–1930. Routledge, 2020. http://dx.doi.org/10.4324/9780429354243-17.
Full textConference papers on the topic "Methods of protection and defence"
Weber, Grace, Bobbi Jo Merten, and Jessica D. Torrey. "Comparison of Cathodic Disbondment Test Methods for Water Infrastructure Coatings." In CORROSION 2018. NACE International, 2018. https://doi.org/10.5006/c2018-10914.
Full textDavis, Guy D., Terry G. Vargo, Andrew W. Dalgleish, and Douglas Deason. "Corrosion Protection and Health Monitoring by Smart Appliqués." In CORROSION 2005. NACE International, 2005. https://doi.org/10.5006/c2005-05205.
Full textMinxu, Lu, Zhao Xinwei, Luo Jinheng, and Bai Zhenquan. "In-Service Oil and Gas Pipeline Safety Assessment Practice and Progress in China." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03152.
Full textGintert, Lawrence A., Robert B. Mason, and Donald R. Skelton. "Development of a Joint Test Protocol for Validation of Alternatives to Corrosion Prevention for Military Ground Vehicle Body Panels." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03222.
Full textLilly, Alexander, Mirella Vargas, Erica Macha, Steven Kopitzke, James Dante, and Victor Rodriguez-Santiago. "The Development of a New Accelerated Corrosion Test Method Using Controlled Relative Humidity." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19475.
Full textDunmire, D., and G. Keller. "Partnering with SSPC in the Pacific Rim." In SSPC 2013 Greencoat. SSPC, 2013. https://doi.org/10.5006/s2013-00016.
Full textWang, Hui, Sreelakshmi Sreeharan, and Homero Casteneda. "Indirect Inspection-based Bayesian Machine Learning Model for Probabilistic Coating Defect Severity Interpretation." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00400.
Full textRaghav, K., G. N. V. Prasad, S. Sripad Kulkarni, and Yashas V. "CanSat Deployment: Electrothermal and Electromechanical Methods." In 2024 IEEE Space, Aerospace and Defence Conference (SPACE). IEEE, 2024. http://dx.doi.org/10.1109/space63117.2024.10667925.
Full textShukla, Pavan K., Roderick E. Fuentes, Andrew Nordquist, Bruce J. Wiersma, and Ingrid Pederson. "Effectiveness of Vapor Corrosion Inhibitors under Elevated Chloride Conditions for Aboveground Storage Tank Application." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20791.
Full textJanucki, Jacek, and Jan Owsik. "An optical method for document protection against counterfeit." In European Symposium on Optics and Photonics for Defence and Security, edited by David H. Titterton. SPIE, 2004. http://dx.doi.org/10.1117/12.578035.
Full textReports on the topic "Methods of protection and defence"
Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.
Full textLeventis, Nicholas, Chariklia Sotiriou-Leventis, Lokeswarappa Dharani, et al. Advanced Polymer Systems for Defence Applications: Power Generation, Protection and Sensing. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada614979.
Full textPiesciorovsky, Emilio, and Ben Ollis. Literature Review: Methods for Microgrid Protection. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1724463.
Full textGudimov, V. N., and S. G. Samochvalova. Software visualization of cryptographic protection methods. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2025. https://doi.org/10.12731/ofernio.2025.25460.
Full textManral, V., M. Bhatia, J. Jaeggli, and R. White. Issues with Existing Cryptographic Protection Methods for Routing Protocols. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6039.
Full textRosati, Julie D. Functional Design of Breakwaters for Shore Protection: Empirical Methods. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada228024.
Full textBall, Sydney J., Thomas L. Wilson Jr, and Richard Thomas Wood. Advanced Control and Protection system Design Methods for Modular HTGRs. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1047629.
Full textRamirez, T. L., K. M. Reed, M. R. Perry, C. M. Grove, and D. E. Molnar. Evaluation of Test Methods and Requirements for Respiratory Protection Systems 21. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada262466.
Full textChang, LiWu. Statistical Sensitive Data Protection and Inference Prevention with Decision Tree Methods. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada465138.
Full textChang, LiWu, and James Tracy. Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada465156.
Full text