Academic literature on the topic 'Security policie'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security policie.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security policie"

1

CUNHA, VIVANE MARTINS, JULIA SOMBERG ALVES, and LISANDRA ESPÍNDULA MOREIRA. "GENOCÍDIO NEGRO E SEGURANÇA PÚBLICA: POLÍTICA DE EXTERMÍNIO EM AÇÕES POLICIAIS." REVISTA PSICOLOGIA POLÍTICA 25 (2025): 1–19. https://doi.org/10.5935/2175-1390.v25e23714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Antonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Full text
Abstract:
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in t
APA, Harvard, Vancouver, ISO, and other styles
4

Pereira da Silva, Oziel. "POLICIAMENTO TURÍSTICO E POLÍCIA TURÍSTICA: FUNÇÕES, OBJETIVOS E SUAS COMPLEXIDADES." Revista Científica da Polícia Militar de Mato Grosso do Sul - RevPMMS 2, no. 1 (2025): 351–72. https://doi.org/10.62927/revpmms.v2i1.95.

Full text
Abstract:
ourist Policing is not anapproach exclusive to a single police unit, but rather a public security strategy aimed at areas with large flows of tourists, involving preventive and repressive actions, including the use of monitoring systems and signage. On the other hand, Tourist Police is a specialized unit dedicated to assisting tourists, with a focus on protection, security, and facilitation of their experience. In this context, to avoid conceptual or interpretive distortions, it is essential to define a unique identity for TouristPolice officers, as well as to appropriately direct the efforts
APA, Harvard, Vancouver, ISO, and other styles
5

Achmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Full text
Abstract:
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal
APA, Harvard, Vancouver, ISO, and other styles
6

Ryma, Abassi1 and Sihem Guemara El Fatmi2. "Executable Security Policies: Specification and Validation of Security Policies." International Journal of Wireless & Mobile Networks (IJWMN) 1, no. 1 (2022): 20. https://doi.org/10.5281/zenodo.6622372.

Full text
Abstract:
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies. A validation process for security policies becomes then necessary before their deployment to avoid resources network damages. Nowadays, there is no automated tool in the network security world allowing such task. Moreover, we have found that the theory developed for this aim in t
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.

Full text
Abstract:
People have a fear of crime because of constant crime in society. To promote the safety of these people, the police are presenting various security policies. The duty of the police is to protect the life, body and property of the people along with maintaining social order in the country.
 The security policy pursued by the police is influenced by various factors such as the external environment, the internal environment, and laws and systems. In previous studies on police security policy, the research on the internal environment and support of police organizations is somewhat limited, so
APA, Harvard, Vancouver, ISO, and other styles
8

Schneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (2000): 30–50. http://dx.doi.org/10.1145/353323.353382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Potter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security policie"

1

MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.

Full text
Abstract:
The evolution of information system sees a continuously increasing need of flexible and sophisticated approaches for the management of security requirements. On one hand, systems are increasingly more integrated (e.g., Bring Your Own Device) and present interfaces for the invocation of services accessible through network connections. On the other hand, system administrators have the responsibility to guarantee that this integration and the consequent exposure of internal resources does not introduce vulnerabilities. The need to prove that the system correctly manages the security requirements
APA, Harvard, Vancouver, ISO, and other styles
2

Schlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.

Full text
Abstract:
Submitted by Aelson Maciera (aelsoncm@terra.com.br) on 2017-08-01T17:24:55Z No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)<br>Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)<br>Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)<br>Made available in DSp
APA, Harvard, Vancouver, ISO, and other styles
3

SQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.

Full text
Abstract:
As praias do Rio de Janeiro são consideradas um dos espaços de lazer mais democráticos da cidade, pelo acesso gratuito e por serem frequentadas por um público heterogêneo, proveniente de diversos bairros e pertencente a diferentes camadas sociais. Contudo, a Operação Verão, uma política de segurança executada nas praias pela Polícia Militar do Estado do Rio de Janeiro e pela Guarda Municipal, pode questionar os limites desta democracia. Entre seus objetivos, a Operação Verão visa prevenir os chamados arrastões, uma modalidade coletiva de furtos e roubos, supostamente cometida por grupos de jov
APA, Harvard, Vancouver, ISO, and other styles
4

Lim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.

Full text
Abstract:
As computer system size and complexity grow, formulating effective policies require more sophistication. There are many risk factors that need to be considered, some of which may be in conflict. Inevitably, unpredictable circumstances that demand decisions will arise during operation. In some cases an automated response may be imperative; in other cases these may be ill-advised. Manual decisions are often made that override the current policy and serve effectively to redefine it. This matter is further complicated in highly dynamic operational environments like mobile ad-hoc networks, in which
APA, Harvard, Vancouver, ISO, and other styles
5

Guillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.

Full text
Abstract:
Esta tesis pretende demostrar la importancia de las diversas concepciones ideales (modelos) a partir de las cuáles se articulan las organizaciones y las actuaciones policiales así como sus contribuciones a la mejora del servicio con que la policía provee a los ciudadanos y las limitaciones de cada uno de ellos. La tesis parte de la idea de que los modelos policiales (y, en consecuencia, de seguridad) no son construcciones teóricas sin influencia en el día a día de las organizaciones policiales, sino todo lo contrario, que tienen influencia en los diversos ámbitos del trabajo policial. Los mode
APA, Harvard, Vancouver, ISO, and other styles
6

Persson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.

Full text
Abstract:
Abstract Title: Building Trust: The contradiction between security and democracy in post apartheid South Africa Author: Magnus Persson Supervisor: Svante Lundberg This paper aims to investigate the contradiction between security and democracy in post-apartheid South African policing, and was executed on the field together with the South African Police Service (SAPS). The theoretical point of departure is that trust between people, in relation to the institutions of society, is fundamental to democratic development. This in combination with previous research on police reform, police academy soc
APA, Harvard, Vancouver, ISO, and other styles
7

Hallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.

Full text
Abstract:
The security policies of mobile devices that describe how we should use these devices are often informally specified. Users have preferences for some apps over others. Some users may avoid apps which can access large amounts of their personal data, whilst others may not care. A user is unlikely to write down these policies or describe them using a formal policy language. This is unfortunate as without a formal description of the policy we cannot precisely reason about them. We cannot help users to pick the apps they want if we cannot describe their policies. Companies have mobile security poli
APA, Harvard, Vancouver, ISO, and other styles
8

Brooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.

Full text
Abstract:
Mobile devices, given their promise of mobility with rich functionality, are being deployed with broadening use cases throughout the United States Department of Defense. All the while, massive quantities of information are stored and accessed by these devices without there being a comprehensive and specialized security policy dedicated to protecting that information. The importance of having a security policy grows as these devices start providing new capabilities and replacing many information systems we currently have deployed. Since the same device will be used in many different contexts, e
APA, Harvard, Vancouver, ISO, and other styles
9

Thimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.

Full text
Abstract:
Research has shown that the police industry has entered into an era of homeland security. However, whether the core functions of policing have significantly changed since September 11, 2001, has been the topic of considerable debate. Using secondary data, the research identifies variables that are most influential in predicting whether Texas police chiefs understand their departments’ homeland security roles and responsibilities. The data was originally obtained in 2007 through self-administered surveys of police chiefs attending the Texas Chief Leadership Series (TPCLS) and the New Chief D
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.

Full text
Abstract:
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from dete
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security policie"

1

Žáček, Pavel. ŠtB na Slovensku za "normalizácie": Agónia komunistickej moci v zvodkách tajnej policie. Ministerstvo spravidlivosti SR, Oddelenie pre dokumentáciu zločinov komunizmu, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weiss, Tomáš. Role policie a armády v Evropské unii: Analýza evropské a národní úrovně s využitím případové studie České republiky. Univerzita Karlova v Praze, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joseph, Carmel. Safety and security. Friedrich Ebert Stiftung, South Africa Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lindsey, George. Canada's security policies. Canadian Institute of International Affairs, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Powell, John W. Campus security and law enforcement. 2nd ed. Butterworth-Heinemann, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stockholm International Peace Research Institute., ed. Policies for common security. Taylor & Francis, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Attwood, Tony. Secondary schools' security policies. First & Best in Education, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kapoor, H. L. Police, crime, and security. Ess Ess Publications, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Canada. Canadian General Standards Board. Security guards and security guard supervisors. Canadian General Standards Board, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ltd, Asia BioBusiness Pte. Food security policies in APEC. APEC Policy Support Unit, Asia Pacific Economic Cooperation, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security policie"

1

Meerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_86-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beach, Derek. "Security Policies." In Analyzing Foreign Policy. Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Legrand, Tim, and Simon Bronitt. "Policing to a Different Beat: Measuring Police Performance." In Policing and Security in Practice. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137007780_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kabay, M. E., and Sean Kelley. "Developing Security Policies." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cuppens, Frédéric, and Nora Cuppens-Boulahia. "Multilevel Security Policies." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nielson, Flemming, René Rydhof Hansen, and Hanne Riis Nielson. "Adaptive Security Policies." In Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61470-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Datta, Anupam, Somesh Jha, Ninghui Li, David Melski, and Thomas Reps. "Analyzing Security Policies." In Analysis Techniques for Information Security. Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02334-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herpolsheimer, Jens. "Regional security policies." In Spatializing Practices of Regional Organizations during Conflict Intervention. Routledge, 2021. http://dx.doi.org/10.4324/9781003106647-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cuppens, Frédéric, and Nora Cuppens-Boulahia. "Multilevel Security Policies." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_824.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security policie"

1

Nedzinskas, Egidijus, and Ruta Nedzinskiene. "CRITICAL COMPETENCIES OF POLICE OFFICERS IN THE CONTEXT OF DIGITAL TRANSFORMATION." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/s07/40.

Full text
Abstract:
The digital transformation requires new knowledge and skills of police officers, thus the competences necessary for the usage of smart, innovative technologies become critical. It is important to ensure that these technologies are integrated into the security policy to effectively fight crime and to ensure the highest standards of respect for citizens� fundamental rights and freedoms. However, there is a lack of information on what competencies are necessary for the qualified usage of innovative technologies of today�s police officers. The lack of research in this area poses challenges to the
APA, Harvard, Vancouver, ISO, and other styles
2

Eyers, David M., Sriram Srinivasan, Ken Moody, and Jean Bacon. "Compile-Time Enforcement of Dynamic Security Policies." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sallai, János, and Johanna Farkas. "21ST CENTURY CHALLENGES AND SOLUTIONS IN THE LIGHT OF HISTORY." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.4.21.p24.

Full text
Abstract:
It is impossible to separate the public police organization from the modern state. King Louis XIV was the founder of the first centrally organized and uniform police force in 1667. A book related to the work of the police was first published in 1705 under the title "Traité de la police". It outlines the three main activities of the police, which are economic regulation, measures of the public order, and general rules of hygiene. The first head of Police and his 44 police commissioners' work was assisted by police inspectors beginning in 1709. The police also appeared on German territory, and t
APA, Harvard, Vancouver, ISO, and other styles
4

Welch, Ian, and Fan Lu. "Policy-driven reflective enforcement of security policies." In the 2006 ACM symposium. ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trivellato, Daniel, Nicola Zannone, and Sandro Etalle. "A Security Framework for Systems of Systems." In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova, and Artem Tishkov. "Hybrid Multi-module Security Policy Verification." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singhal, Anoop. "Web Services Security: Challenges and Techniques." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gogov, Bogdancho. "PREDICTIVE POLICING." In SECURITY HORIZONS. Faculty of Security- Skopje, 2023. http://dx.doi.org/10.20544/icp.8.1.23.p20.

Full text
Abstract:
Crime control strategies in the past have largely been focused on reactive tactics, while the focus of policing was to respond quickly to incidents and crimes. However, as the crime and security situation changed, so did the paradigm shift from a reactive style of policing to proactive policing. Proactive work aims to prevent crime rather than just react to it. It has been shown that crime prevention is more closely related to proactive policing than to reactive policing. Crime prevention strategies such as community-oriented policing, problem-oriented policing, intelligence-led policing were
APA, Harvard, Vancouver, ISO, and other styles
9

Basile, Cataldo, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente, and Antonio F. Gomez Skarmeta. "POSITIF: A Policy-Based Security Management System." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security policie"

1

Research Institute (IFPRI), International Food Policy. Developed country policies: Domestic farm policy reform and global food security. International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sachnackenberg, Dan, Kelly Bunn, Daylan Darby, Laurence Rockwell, and Travis Reid. Adaptive System Security Policies. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada400196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schneider, Edward A., William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with Adaptive Security Policies. Defense Technical Information Center, 1996. http://dx.doi.org/10.21236/ada311215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carney, Michael, Brian Loe, and Terrence Mitchem. Experience with Adaptive Security Policies. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada345381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Irvine, Cynthia E. Security Policy Enforcement. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada605488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goebel, Peter. German Security Policy. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saito, Toshio. Japan's Security Policy. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spencer, Ray, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada443108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Halpern, Joseph Y. Formulating and Reasoning about Security Policies. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada431396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Villamizar, C., C. Alaettinoglu, D. Meyer, and S. Murphy. Routing Policy System Security. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!