Academic literature on the topic 'Security policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security policie"
CUNHA, VIVANE MARTINS, JULIA SOMBERG ALVES, and LISANDRA ESPÍNDULA MOREIRA. "GENOCÍDIO NEGRO E SEGURANÇA PÚBLICA: POLÍTICA DE EXTERMÍNIO EM AÇÕES POLICIAIS." REVISTA PSICOLOGIA POLÍTICA 25 (2025): 1–19. https://doi.org/10.5935/2175-1390.v25e23714.
Full textAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Full textSupriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.
Full textPereira da Silva, Oziel. "POLICIAMENTO TURÍSTICO E POLÍCIA TURÍSTICA: FUNÇÕES, OBJETIVOS E SUAS COMPLEXIDADES." Revista Científica da Polícia Militar de Mato Grosso do Sul - RevPMMS 2, no. 1 (2025): 351–72. https://doi.org/10.62927/revpmms.v2i1.95.
Full textAchmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.
Full textRyma, Abassi1 and Sihem Guemara El Fatmi2. "Executable Security Policies: Specification and Validation of Security Policies." International Journal of Wireless & Mobile Networks (IJWMN) 1, no. 1 (2022): 20. https://doi.org/10.5281/zenodo.6622372.
Full textKim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.
Full textSchneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (2000): 30–50. http://dx.doi.org/10.1145/353323.353382.
Full textPotter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.
Full textMcIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.
Full textDissertations / Theses on the topic "Security policie"
MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Full textSchlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.
Full textSQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.
Full textLim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.
Full textGuillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.
Full textPersson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.
Full textHallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.
Full textBrooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Full textThimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.
Full textBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Full textBooks on the topic "Security policie"
Žáček, Pavel. ŠtB na Slovensku za "normalizácie": Agónia komunistickej moci v zvodkách tajnej policie. Ministerstvo spravidlivosti SR, Oddelenie pre dokumentáciu zločinov komunizmu, 2002.
Find full textWeiss, Tomáš. Role policie a armády v Evropské unii: Analýza evropské a národní úrovně s využitím případové studie České republiky. Univerzita Karlova v Praze, 2014.
Find full textJoseph, Carmel. Safety and security. Friedrich Ebert Stiftung, South Africa Office, 2002.
Find full textLindsey, George. Canada's security policies. Canadian Institute of International Affairs, 2003.
Find full textPowell, John W. Campus security and law enforcement. 2nd ed. Butterworth-Heinemann, 1994.
Find full textStockholm International Peace Research Institute., ed. Policies for common security. Taylor & Francis, 1985.
Find full textAttwood, Tony. Secondary schools' security policies. First & Best in Education, 1998.
Find full textCanada. Canadian General Standards Board. Security guards and security guard supervisors. Canadian General Standards Board, 1999.
Find full textLtd, Asia BioBusiness Pte. Food security policies in APEC. APEC Policy Support Unit, Asia Pacific Economic Cooperation, 2012.
Find full textBook chapters on the topic "Security policie"
Meerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_86-1.
Full textMeerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_86.
Full textBeach, Derek. "Security Policies." In Analyzing Foreign Policy. Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.
Full textLegrand, Tim, and Simon Bronitt. "Policing to a Different Beat: Measuring Police Performance." In Policing and Security in Practice. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137007780_1.
Full textKabay, M. E., and Sean Kelley. "Developing Security Policies." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch66.
Full textCuppens, Frédéric, and Nora Cuppens-Boulahia. "Multilevel Security Policies." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_824.
Full textNielson, Flemming, René Rydhof Hansen, and Hanne Riis Nielson. "Adaptive Security Policies." In Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61470-6_17.
Full textDatta, Anupam, Somesh Jha, Ninghui Li, David Melski, and Thomas Reps. "Analyzing Security Policies." In Analysis Techniques for Information Security. Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02334-7_4.
Full textHerpolsheimer, Jens. "Regional security policies." In Spatializing Practices of Regional Organizations during Conflict Intervention. Routledge, 2021. http://dx.doi.org/10.4324/9781003106647-5.
Full textCuppens, Frédéric, and Nora Cuppens-Boulahia. "Multilevel Security Policies." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_824.
Full textConference papers on the topic "Security policie"
Nedzinskas, Egidijus, and Ruta Nedzinskiene. "CRITICAL COMPETENCIES OF POLICE OFFICERS IN THE CONTEXT OF DIGITAL TRANSFORMATION." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/s07/40.
Full textEyers, David M., Sriram Srinivasan, Ken Moody, and Jean Bacon. "Compile-Time Enforcement of Dynamic Security Policies." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.24.
Full textSallai, János, and Johanna Farkas. "21ST CENTURY CHALLENGES AND SOLUTIONS IN THE LIGHT OF HISTORY." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.4.21.p24.
Full textWelch, Ian, and Fan Lu. "Policy-driven reflective enforcement of security policies." In the 2006 ACM symposium. ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141645.
Full textTrivellato, Daniel, Nicola Zannone, and Sandro Etalle. "A Security Framework for Systems of Systems." In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.16.
Full textKotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova, and Artem Tishkov. "Hybrid Multi-module Security Policy Verification." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.
Full textSinghal, Anoop. "Web Services Security: Challenges and Techniques." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.50.
Full textGogov, Bogdancho. "PREDICTIVE POLICING." In SECURITY HORIZONS. Faculty of Security- Skopje, 2023. http://dx.doi.org/10.20544/icp.8.1.23.p20.
Full textBasile, Cataldo, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente, and Antonio F. Gomez Skarmeta. "POSITIF: A Policy-Based Security Management System." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.37.
Full textRoth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.
Full textReports on the topic "Security policie"
Research Institute (IFPRI), International Food Policy. Developed country policies: Domestic farm policy reform and global food security. International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_07.
Full textSachnackenberg, Dan, Kelly Bunn, Daylan Darby, Laurence Rockwell, and Travis Reid. Adaptive System Security Policies. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada400196.
Full textSchneider, Edward A., William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with Adaptive Security Policies. Defense Technical Information Center, 1996. http://dx.doi.org/10.21236/ada311215.
Full textCarney, Michael, Brian Loe, and Terrence Mitchem. Experience with Adaptive Security Policies. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada345381.
Full textIrvine, Cynthia E. Security Policy Enforcement. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada605488.
Full textGoebel, Peter. German Security Policy. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385824.
Full textSaito, Toshio. Japan's Security Policy. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385898.
Full textSpencer, Ray, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada443108.
Full textHalpern, Joseph Y. Formulating and Reasoning about Security Policies. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada431396.
Full textVillamizar, C., C. Alaettinoglu, D. Meyer, and S. Murphy. Routing Policy System Security. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2725.
Full text