Academic literature on the topic 'Security current'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security current.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security current"

1

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Full text
Abstract:
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If
APA, Harvard, Vancouver, ISO, and other styles
2

Kuzoma, Vitalii. "GLOBAL FOOD SECURITY: SECURITY FACTORS AND CURRENT TRENDS." Energy saving. Power engineering. Energy audit., no. 6(196) (August 25, 2024): 38–49. http://dx.doi.org/10.20998/2313-8890.2024.06.04.

Full text
Abstract:
The issue of ensuring global food security remains one of the leading and decisive issues for all countries in the world, without exception. The implementation of the goals of sustainable development, which have become a strategic priority for society, has separated the problems of overcoming hunger and ensuring the health of the population as key and the main priority for the further existence of humanity. The article examines the essence of the category "food security" from various scientific and methodological positions and conducts a comprehensive review of the prominent trends that accomp
APA, Harvard, Vancouver, ISO, and other styles
3

Ponomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.

Full text
Abstract:
Ukrainian banking institutions conduct their activity under the influence of various risks, which create critical situations for them. In this context, banks should pay more attention to their own security. The article analyzes the theoretical approaches to the concept of “banking security”, examines the level of banking security as a component of the financial and economic security of the state, and determines the ways to improve it. Banking security was analyzed based on the data of the National Bank of Ukraine and other banks that are part of the banking system of the country.The current st
APA, Harvard, Vancouver, ISO, and other styles
4

Miyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are an
APA, Harvard, Vancouver, ISO, and other styles
6

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and
APA, Harvard, Vancouver, ISO, and other styles
7

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and
APA, Harvard, Vancouver, ISO, and other styles
8

Park, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kudabayeva, A. Zh. "Current trends in food security." BULLETIN of the L.N. Gumilyov Eurasian National University.Political Science. Regional Studies. Oriental Studies. Turkology Series. 143, no. 2 (2023): 36–44. http://dx.doi.org/10.32523/2616-6887/2023-143-2-36-44.

Full text
Abstract:
The problem of food security has always been relevant and was studied by academics from the economic, environmental, social, and gender approaches, however rising prices, and in some cases food shortages, have triggered a new interest in this area of research. This problem is being addressed at the level of the state and international organizations. However, the approach to the task of these actors is different. If international organizations approach the problem of the food security from the standpoint of the international norm “the right to food”, relying on the postulates of neoliberalism,
APA, Harvard, Vancouver, ISO, and other styles
10

P., K. Paul, and S. Aithal P. "Cloud Security: An Overview and Current Trend." International Journal of Applied Engineering and Management Letters (IJAEML) 3, no. 2 (2019): 6. https://doi.org/10.5281/zenodo.3514577.

Full text
Abstract:
Cloud security is also called as cloud computing security. It is the set of policies, technologies,  applications, and control utilized for virtual  infrastructure which  includes hardware, software,  and application. The field is closely related to database security, web security, network security,  etc. In other words, cloud security is very close to computer security, IT security or information  security. Day  by  day  the  IT  infrastructure  becomes  a  common  need  of  every  individual  and&n
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security current"

1

Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.

Full text
Abstract:
IoT is a rapidly growing area with products in the consumer, commercial and industrial market. Collecting data with multiple small and often battery-powered devices sets new challenges for both security and communication. There has been a distinct lack of a IoT specific communication protocols. The industry has had to use bulky interfaces not suitable for resource-constrained devices. MQTT is a standardised communication protocol made for the IoT industry. MQTT does however not have built-in security and it is up to the developers to implement a suitable security countermeasure. To evaluate ho
APA, Harvard, Vancouver, ISO, and other styles
2

Kashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that has been around for three decades now. It is being used in various scenarios in technologically modern societies around the world and becoming a crucial part of our daily life. But we often forget how the inner technology is designed to work, or even if it is as trustable and secure as we think. While the RFID technology and protocols involved with it has been designed with an acceptable level of security in mind, not all implementations and use cases are as secure as consumers believe. A majority of implementations and products that a
APA, Harvard, Vancouver, ISO, and other styles
3

Gao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.

Full text
Abstract:
<p>Nowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.</p><p>In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better
APA, Harvard, Vancouver, ISO, and other styles
4

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Full text
Abstract:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information securit
APA, Harvard, Vancouver, ISO, and other styles
5

Baldo, Martina <1996&gt. "Climate change: a current challenge for global security." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19655.

Full text
Abstract:
A causa dell’allarmante aumento in quantità e velocità delle emissioni di CO2 soprattutto nel corso dell’ultimo secolo, il cambiamento climatico è stato ampiamente riconosciuto come una questione di rilevanza nazionale ed internazionale concernente quasi esclusivamente la sfera ambientale. Da più di un decennio risulta, tuttavia, evidente quanto variazioni repentine di temperatura rappresentino anche una notevole minaccia in chiave di sicurezza globale, richiedendo maggiore protezione tanto del singolo individuo quanto di un intero Stato. Difatti, attraverso l’attuazione di concrete politiche
APA, Harvard, Vancouver, ISO, and other styles
6

Zahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.

Full text
Abstract:
Information security has always been a topic of concern in the world as an emphasis on new techniques to secure the identity of a legitimate user is regarded as top priority. To counter such an issue, we have a traditional way of authentication factors “what you have” and “what you know” in the form of smart cards or passwords respectively. But biometrics is based on the factor “who are you” by analyzing human physical or behavioral characteristics. Biometrics has always been an efficient way of authorization and is now considered as a $1500 million industry where fingerprints dominate the bio
APA, Harvard, Vancouver, ISO, and other styles
7

Qiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.

Full text
Abstract:
<p>E-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues th
APA, Harvard, Vancouver, ISO, and other styles
8

Buzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.

Full text
Abstract:
In the wake of September 11th and following an overemphasis on passenger air travel security, the air cargo system potentially has become the primary target for terrorists. States have undertaken various regulatory approaches that involve technology and operational measures aimed at addressing the perceived security threats in the air cargo industry. This thesis presents both an overview of the potential risks and best security practices identified within several international, regional and national initiatives, including the "authorized economic operator" and "secure supply chain" mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
9

Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.

Full text
Abstract:
While research has been done in the past on evaluating standardised security protocols, most notably TLS, there is still room for improvement. Modern security protocols need to be rigorously and thoroughly analysed, ideally before they are widely deployed, so as to minimise the impact of often creative, powerful adversaries. We explore the potential vulnerabilities of modern security protocols specified in current standards, including TLS 1.2, TLS 1.3, and SSH. We introduce and formalise the threat of Actor Key Compromise (AKC), and show how this threat can and cannot be avoided in the protoco
APA, Harvard, Vancouver, ISO, and other styles
10

Yousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.

Full text
Abstract:
<p>The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality. </p><p>The important aspects of the system that need protection are
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security current"

1

K, Kumar Shubh, and Lipton Michael 1937-, eds. Current issues in food security. Pergamon, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mendelson, Gallery Shari, ed. Current issuesin security management: Readings from Security management magazine. Butterworths, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dutta, Nitul, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, and Emil Pricop. Cyber Security: Issues and Current Trends. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6597-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jähnke, Jochen. Current issues in IT security 2012. Duncker & Humblot, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Julian, Disney, and Australian National University. Centre for International and Public Law., eds. Current issues in social security law. Centre for International and Public Law, Australian National University, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jennifer, Zellan, ed. Aviation security: Current issues and developments. Nova Science Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mendelson, Gallery Shari, ed. Current issues in security management: Readings from Security management magazine. Butterworths, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

McCormack, Richard T. Current challenges facing the OAS. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bedi, R. S. Random thoughts: National security and current issues. Lancer's Books, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A, McManus Mark, and Computer Economics Inc, eds. IT security study: The current state of IT security budgets, management practices, security incidents. Computer Economics, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security current"

1

Lakshmi, Vasantha. "Current State of Security." In Beginning Security with Microsoft Technologies. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macbean, Alasdair I. "Achieving Food Security." In Current Issues in Development Economics. Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21587-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baseley-Walker, Ben. "Current international space security initiatives." In The Fair and Responsible Use of Space. Springer Vienna, 2010. http://dx.doi.org/10.1007/978-3-211-99653-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuszewska, Agnieszka. "Current security and economic dynamics." In Law and Conflict Resolution in Kashmir. Routledge, 2022. http://dx.doi.org/10.4324/9781003196549-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gillespie, Anna. "Current Nuclear Programmes in Third World Countries." In Plutonium and Security. Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-11693-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lambrinoudakis, Costas, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, and Spyros Ikonomopoulos. "Secure Electronic Voting: the Current Landscape." In Advances in Information Security. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Farahmandi, Farimah, Yuanwen Huang, and Prabhat Mishra. "Trojan Detection Using Dynamic Current Analysis." In System-on-Chip Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30596-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tsybulenko, Evhen, and Anastassiya Platonova. "Current Issues of Hague Law." In International Conflict and Security Law. T.M.C. Asser Press, 2022. http://dx.doi.org/10.1007/978-94-6265-515-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jacobs, Stuart. "Security of Current Mobile IP Solutions." In Advances in Database Technologies. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-49121-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security current"

1

Luňáček, Oldřich. "Current Challenges in the Individual Security Environment." In 2025 International Conference on Military Technologies (ICMT). IEEE, 2025. https://doi.org/10.1109/icmt65201.2025.11060898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Charu, Sandeep Mathur, and Alok Singh Sengar. "Evaluating Current Cloud Security Challenges and IAAS Optimization." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brookson, C. B. "Security in current systems." In IEE Colloquium on Security in Networks. IEE, 1995. http://dx.doi.org/10.1049/ic:19950131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rogers, Leslie A. "Current best estimates of planet populations." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2016. http://dx.doi.org/10.1117/12.2223920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, Eric, and Orlando Mardner. "EDUCATION AND SECURITY CURRENT AND FUTURE CHALLENGES IN TEACHING AND LEARNING SECURITY STUDIES." In SECURITY HORIZONS. Faculty of Security- Skopje, 2022. http://dx.doi.org/10.20544/icp.3.6.22.p04.

Full text
Abstract:
Organisations, institutions, and businesses continue to face unprecedented security challenges. The challenges include threats to cyber security, terror threats, and identity thefts among others. These threats are largely influenced by technological developments and globalisation. At the same time, globalization and the faster rate of technological transfers provide new opportunities for new security advancements. While most security studies have been designed to address known security threats, the future is uncertain; thus, security studies must be designed in a way that promotes curiosity, s
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Jian, Huaijian Chen, Liangyi Gong, Jing Cao, and Zhaojun Gu. "The Current Research of IoT Security." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pattanayak, Animesh, and Matt Kirkland. "Current Cyber Security Challenges in ICS." In 2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 2018. http://dx.doi.org/10.1109/icii.2018.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eslahi, Meisam, Maryam Var Naseri, H. Hashim, N. M. Tahir, and Ezril Hisham Mat Saad. "BYOD: Current state and security challenges." In 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2014. http://dx.doi.org/10.1109/iscaie.2014.7010235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tamošiūnienė, Rima, and Corneliu Munteanu. "Current research approaches to economic security." In 1st International Conference on Business Management. Editorial Universitat Politècnica de València, 2015. http://dx.doi.org/10.4995/icbm.2015.1537.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security current"

1

Lodderstedt, T., J. Bradley, A. Labunets, and D. Fett. Best Current Practice for OAuth 2.0 Security. RFC Editor, 2025. https://doi.org/10.17487/rfc9700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wayne F. Boyer and Scott A. McBride. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/957512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liebman, Jeffrey. Redistribution in the Current U.S. Social Security System. National Bureau of Economic Research, 2001. http://dx.doi.org/10.3386/w8625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rebo, Eero. Estonian National Security Strategy: Current and Future Challenges. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada590661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rolston. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kaeo, M. Operational Security Current Practices in Internet Service Provider Environments. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rassokha, Ekaterina. LEGAL PROBLEMS OF INTERNATIONAL SECURITY IN THE CURRENT ENVIRONMEN. Intellectual Archive, 2021. http://dx.doi.org/10.32370/iaj.2559.

Full text
Abstract:
The article reflects the main views on international security problems in the legal aspect and identified actual problems and contradictions in the application and compliance with international humanitarian law norms.
APA, Harvard, Vancouver, ISO, and other styles
8

Gerosa, Marco, David A. Wheeler, and Stephen Hendrick. Secure Software Development Education 2024 Survey: Understanding Current Needs. The Linux Foundation, 2024. https://doi.org/10.70828/cadl1649.

Full text
Abstract:
How can we improve education on secure software development? The OpenSSF commissioned a study to hear directly from the software security community on the perceived gaps in their training, and how we can better support the securing of the software supply chain from an educational perspective. Key findings from the report indicate that an important minority of developers are not familiar with secure software development, and many identified a lack of training or a lack of awareness around the courses available. Python was highly rated by respondents for increased training, and ultimately securi
APA, Harvard, Vancouver, ISO, and other styles
9

Todd, Frank P. Current National Space Security Trends and Implications for the Future. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada401672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ferwerda, Jeremy, Nazli Choucri, and Stuart Madnick. Institutional Foundations for Cyber Security: Current Responses and New Challenges. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada530584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!