Academic literature on the topic 'Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security"
Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Full textNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Full textPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Full textAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Full textBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Full textNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Full textKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Full textMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Full textWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Full textEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Full textDissertations / Theses on the topic "Security"
Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Full textMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Full textAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Full textForman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Full textKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Full textEstenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.
Full textKalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Full textKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Full textBooks on the topic "Security"
Poindexter, John M. Regional security, collective security, and American security. U.S. Dept. of State, Bureau of Public Affairs, 1986.
Find full textTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Springer, 2012.
Find full textJarvis, Lee, and Jack Holland. Security. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Full textBourbeau, Philippe, ed. Security. Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Full textChartered Institute of Public Finance and Accountancy., ed. Security. Chartered Institute of Public Finance and Accountancy, 1991.
Find full textNational Examining Board for Supervisory Management., ed. Security. 2nd ed. Pergamon Open Learning, 1991.
Find full textBook chapters on the topic "Security"
Baghel, Vivek Singh, and Surya Prakash. "Securing Identities through Biometric Template Security." In Multimedia Security. Apple Academic Press, 2025. https://doi.org/10.1201/9781003459040-4.
Full textGjørv, Gunhild Hoogensen. "Human security, gender security, and positive security." In Positive Security. Routledge, 2022. http://dx.doi.org/10.4324/9781003296430-3.
Full textInnes, Alexandria J. "Performing Security, Theorizing Security." In Migration, Citizenship and the Challenge for Security. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.
Full textCurtis, Bobby. "Security." In Pro Oracle GoldenGate for the DBA. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1179-3_8.
Full textWicklund, Phil. "Security." In Practical Sitecore 8 Configuration and Strategy. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1236-3_8.
Full textJiang, Liangjun. "Security." In iOS eCommerce App Development with Parse. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.
Full textLake, Peter, and Paul Crowther. "Security." In Undergraduate Topics in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5601-7_12.
Full textSteinmetz, Ralf, and Klara Nahrstedt. "Security." In X.media.publishing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-662-08876-0_4.
Full textSmith, Mary S. "Security." In Parking Structures. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1577-7_6.
Full textChen, Shanzhi, Fei Qin, Bo Hu, Xi Li, Zhonglin Chen, and Jiamin Liu. "Security." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61201-0_6.
Full textConference papers on the topic "Security"
Kothari, Sonali, Tejas Ulbhaje, Vishant Kalwani, Yash Mangale, and Pooja Bagane. "Securix: Mobile Security SDK." In 2024 19th International Workshop on Semantic and Social Media Adaptation & Personalization (SMAP). IEEE, 2024. https://doi.org/10.1109/smap63474.2024.00032.
Full textJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.
Full textTiwari, Rajni, Debasmita Mishra, Nidhi Sinha, and Biswaranjan Acharya. "Securing IoT: Emphasizing Requirements for Enhanced Device Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882398.
Full textNeville, Karen, and Philip Powell. "Securing Security through Education." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.
Full textLee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.
Full text"Medical Image Security Using Quantum Cryptography." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Full textRauf, Irum, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh, and Awais Rashid. "Security but not for security's sake." In ICSE '20: 42nd International Conference on Software Engineering. ACM, 2020. http://dx.doi.org/10.1145/3387940.3392230.
Full textChoudhary, Deepshikha, and Vidyavati Ramteke. "Securing SCADA : Critical infrastructure and security." In INTERNATIONAL CONFERENCE ON SUSTAINABLE MATERIALS SCIENCE, STRUCTURES, AND MANUFACTURING. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0168178.
Full textHolasova, Eva, Karel Kuchar, Radek Fujdiak, Petr Blazek, and Jiri Misurec. "Security Modules for Securing Industrial Networks." In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). IEEE, 2021. http://dx.doi.org/10.1109/cecit53797.2021.00199.
Full textPrathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha, and U. M. Gopal Krishna. "Digital security for securing private information." In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.
Full textReports on the topic "Security"
Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer, and Fred B. Schneider. Securing BGP Using External Security Monitors. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada633655.
Full textRamsey, Christopher R. Securing America's Future through Security Cooperation. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada590220.
Full textGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.
Full textLevin, Timothy E., Cynthia E. Irvine, and Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada435861.
Full textKlingenstein, Ken, and Chris Misra. Internet2 Security Activities: The Security Fruitcake. Internet2, 2005. http://dx.doi.org/10.26869/ti.75.1.
Full textGodson, Roy, Richard Shultz, Querine Hanlon, and Samantha Ravich. Adapting America's Security Paradigm and Security Agenda. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada516785.
Full textRonis, Sheila R. Economic Security: Neglected Dimension of National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada585192.
Full textBartock, Michael, Murugiah Souppaya, Jerry Wheeler, et al. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Full textNicholas, Nancy. Global Security Overview Solving National Security Challenges. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2373128.
Full textPrasad, Dr Anand R. Cyber Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas005.
Full text