Books on the topic 'Security agents'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security agents.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Vigna, Giovanni, ed. Mobile Agents and Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.
Full textJansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textJansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textJansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textTom, Karygiannis, and National Institute of Standards and Technology (U.S.), eds. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textKunreuther, Howard. Interdependent security: The case of identical agents. National Bureau of Economic Research, 2002.
Find full text-P, Tsai Jeffrey J., ed. Security modeling and analysis of mobile agent systems. Imperial College Press, 2006.
Find full textWallin, Arto. Secure auction for mobile agents. VTT Technical Research Centre of Finland, 2004.
Find full textCongress, United States. Homeland security: Information on training new Border Patrol agents. General Accountability Office, 2007.
Find full textWayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textWayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textPetkov, Plamen, Dumitru Tsiulyanu, Wilhelm Kulisch, and Cyril Popov, eds. Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9697-2.
Full textElizalde, Rosa Miriam. The dissidents: Cuban state security agents reveal the true story. Editora Política, 2003.
Find full textFox, Todd. All access: The secrets of tour security. [publisher not identified], 2011.
Find full textHeineman, William R. Rapid detection of bioterrorism agents in water supplies. Awwa Research Foundation, 2007.
Find full textBelarus) Aktualʹnye problemy obespechenii︠a︡ pogranichnoĭ bezopasnosti (6nd 2022 Minsk. Aktualʹnye problemy obespechenii︠a︡ pogranichnoĭ bezopasnosti: Materialy VI Mezhdunarodnoĭ nauchno-prakticheskoĭ konferent︠s︡ii : g. Minsk, 29 apreli︠a︡ 2022 goda : v trekh chasti︠a︡kh. Institut pogranichnoĭ sluzhby Respubliki Belarusʹ, 2022.
Find full textVishnevskai︠a︡, V. P. Aktualʹnye problemy obespechenii︠a︡ pogranichnoĭ bezopasnosti: Materialy V Mezhdunarodnoĭ zaochnoĭ nauchno-prakticheskoĭ konferent︠s︡ii, 30 apreli︠a︡ 2021 : v dvukh chasti︠a︡kh. IPS RB, 2021.
Find full textGrishko, V. D. Aktualʹnye problemy obespechenii︠a︡ pogranichnoĭ bezopasnosti: Materialy II Mezhdunarodnoĭ zaochnoĭ nauchno-prakticheskoĭ konferent︠s︡ii : Minsk, 21 fevrali︠a︡ 2018 goda : v dvukh chasti︠a︡kh. GUO "IPS RB", 2018.
Find full textSchleifman, Nurit. Undercover agents in the Russian revolutionary movement: The SR party, 1902-14. St. Martin's Press, 1988.
Find full textBarley, Mike. Safety and security in multiagent systems: Research results from 2004-2006. Springer, 2009.
Find full textOshima, Kevin H. Ultrafiltration-based extraction for biological agents in early warning systems. Awwa Research Foundation, 2006.
Find full textEdward, Sabelhaus John, Sevilla Sanz Almudena, and United States. Congressional Budget Office, eds. Behavioral effects of social security reform in a dynamic micro-simulation with life-cycle agents. Congressional Budget Office, 2005.
Find full textGroup, Express, ed. India empowered: Change agents speak on an idea whose time has come. Penguin Viking, 2006.
Find full textEntretiens universitaires réguliers pour l'administration en Europe (3rd 1999 Limoges, France). La retraite des agents publics en Europe: État des lieux, problématique et devenir. PULIM, 2001.
Find full textUnited States. Congress. House. A bill to amend title XVIII of the Social Security Act to eliminate the time limitation on benefits for immunosuppressive drugs under the Medicare program. U.S. G.P.O., 1999.
Find full textPetrov, I. V. Pravovoe regulirovanie operativno-razysknoĭ dei︠a︡telʹnosti na primere pogranichnykh organov: Monografii︠a︡. Izdatelʹskiĭ dom FGBOUVPO "GUU", 2013.
Find full textKuryli︠u︡k, I︠U︡ B. Kryminalʹno-pravove zabezpechenni︠a︡ protydiï porushenni︠u︡ pravyl nesenni︠a︡ prykordonnoï sluz︠h︡by: Monohrafii︠a︡. BD "Dakor", 2013.
Find full textHinton, Henry L. Chemical weapons and materiel: Key factors affecting disposal costs and schedule : statement of Henry L. Hinton, Jr., Assistant Comptroller General, National Security and International Affairs Division, before the Subcommittee on Military Procurement, Committee on National Security, House of Representatives. The Office, 1997.
Find full textACS, '2002 (2002 Miedzyzdroje Poland). Artificial intelligence and security in computing systems: 9th International Conference, ACS '2002, Miḑzyzdroje, Poland, October 23-25, 2002 : proceedings. Kluwer Academic, 2003.
Find full textACS, '2002 (2002 Mieḑzyzdroje Poland). Artificial intelligence and security in computing systems: 9th international conference, ACS '2002, Mieḑzyzdroje, Poland, October 23-25, 2002 : proceedings. Kluwer Academic Publishers, 2003.
Find full textHans Raj, P. C. Gupta, Gianetan Singh Sekhon. Security Issues,Aspects and Domain Based Security for Mobile Agents. LAP LAMBERT Academic Publishing, 2012.
Find full textSoo, Chopin, and Jeffrey J. Tsai. Security Modeling and Analysis of Mobile Agent Systems. World Scientific Publishing Co Pte Ltd, 2006.
Find full textTsai, Jeffery J. P. Security Modeling and Analysis of Mobile Agent Systems. World Scientific Publishing Co Pte Ltd, 2006.
Find full textAviation Security (Air Cargo Agents) (Amendment) Regulations 2023. Stationery Office, The, 2023.
Find full textZhao, Ming, Valentina Emilia Balas, Sheng-Lung Peng, and Shiuh-Jeng Wang. Security with Intelligent Computing and Big-data Services. Springer, 2018.
Find full textKulisch, Wilhelm, Plamen Petkov, Dumitru Tsiulyanu, and Cyril Popov. Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer, 2015.
Find full textKulisch, Wilhelm, Plamen Petkov, Dumitru Tsiulyanu, and Cyril Popov. Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer, 2015.
Find full textKulisch, Wilhelm, Plamen Petkov, Dumitru Tsiulyanu, and Cyril Popov. Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer, 2015.
Find full textKulisch, Wilhelm, Plamen Petkov, and Dumitru Tsiulyanu. Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer, 2015.
Find full textTsai, Jeffrey J. P. Security Modeling And Analysis of Mobile Agent Systems (Electrical and Computer Engineering). World Scientific Publishing Company, 2006.
Find full textPucci, Molly. Security Empire. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300242577.001.0001.
Full textNyokong, Tebello, and Vefa Ahsen. Photosensitizers in Medicine, Environment, and Security. Springer, 2012.
Find full textJain, Lakhmi C., Ching-Nung Yang, and Sheng-Lung Peng. Security with Intelligent Computing and Big-data Services: Proceedings of the Second International Conference on Security with Intelligent Computing ... in Intelligent Systems and Computing). Springer, 2019.
Find full textSencar, Husrev T., Shiguo Lian, Sergio Velastin, and Nikolaos Nikolaidis. Intelligent Multimedia Analysis for Security Applications. Springer, 2012.
Find full textSencar, Husrev T., Shiguo Lian, Sergio Velastin, and Nikolaos Nikolaidis. Intelligent Multimedia Analysis for Security Applications. Springer London, Limited, 2010.
Find full textLiu, Jimingx, and Yiming Ye. E-Commerce Agents: Marketplace Solutions, Security Issues, and Supply and Demand. Springer London, Limited, 2006.
Find full textNyokong, Tebello, and Vefa Ahsen. Photosensitizers in Medicine, Environment, and Security. Springer, 2014.
Find full text