Academic literature on the topic 'Security Section'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Section.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Section"
Khin, Thandar Tun, Sandar Aung Aye, and Lwin Thant May. "GSM Based Fire Security System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1686–90. https://doi.org/10.5281/zenodo.3591292.
Full textMR., SHIVAM KUMAR DR. SHAMBHU KUMAR SINGH. "STRENGTHENING CLOUD SECURITY AND DATA INTEGRITY WITH INNOVATIVE ENCRYPTION METHODS." International Journal For Technological Research In Engineering 11, no. 11 (2024): 1–11. https://doi.org/10.5281/zenodo.12670480.
Full textSjoberg, Laura. "Failure and critique in critical security studies." Security Dialogue 50, no. 1 (2018): 77–94. http://dx.doi.org/10.1177/0967010618783393.
Full textMunoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. "RFID Applications and Security Review." Computation 9, no. 6 (2021): 69. http://dx.doi.org/10.3390/computation9060069.
Full textLiu, Jin Jiang, Mei He, Hong Ke Xu, Qi Wang, and Yong Mei Yang. "The Identified Method of Accident-Prone Section Based on Principal Component-Gray Clustering Analysis." Applied Mechanics and Materials 135-136 (October 2011): 1060–66. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1060.
Full textRangel de Mesquita, Maria José. "Judicial review of Common Foreign and Security Policy by the ECtHR and the (re)negotiation on the accession of the EU to the ECHR." Maastricht Journal of European and Comparative Law 28, no. 3 (2021): 356–70. http://dx.doi.org/10.1177/1023263x20988241.
Full textZhang, Feifan, Yuncai Wang, Yuehui Sun, et al. "Key Space Enhancement in Chaotic Secure Communication Utilizing Monolithically Integrated Multi-Section Semiconductor Lasers." Photonics 10, no. 2 (2023): 213. http://dx.doi.org/10.3390/photonics10020213.
Full textBrooks, Julia, and Rob Grace. "Confronting Humanitarian Insecurity." Journal of Humanitarian Affairs 2, no. 1 (2020): 11–20. http://dx.doi.org/10.7227/jha.030.
Full textVimalRosy, J., and S. Britto Ramesh Kumar. "Security Threats in Cloud Computing." Asian Journal of Computer Science and Technology 8, S1 (2019): 80–83. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1946.
Full textSheikh, Mahmood A., Syed Muhammad Bin Ahmed, and Afrasiab Ahmed Rana. "ECONOMIC SECURITY IN PAKISTAN: INDICATORS, ISSUES, IMPACTS AND WAY FORWARD." Pakistan Journal of Social Research 04, no. 01 (2022): 990–99. http://dx.doi.org/10.52567/pjsr.v4i1.1268.
Full textDissertations / Theses on the topic "Security Section"
Matotoka, Motlhatlego Dennis. "Section 37C of the Pension Funds Act, 24 of 1956 : a social security measure to escape destitution." Thesis, University of Limpopo, Turfloop Campus, 2013. http://hdl.handle.net/10386/1102.
Full textBhusal, Lok Nath. "Poverty underestimation and relative strength of social security and economic globalisation in poverty reduction : perceptions survey evidence from Nepal and cross-section analysis from 119 developing countries." Thesis, Oxford Brookes University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579520.
Full textSanders, Michael. "The USA PATRIOT Act and Punctuated Equilibrium." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2759.
Full textJones, Jonathan. "The interpretation and effect of section 197 of the Labour Relations Act 66 of 1995." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52544.
Full textJakob, Olaf. "Perspectives on determining permanent disablement in South African occupational law." Thesis, North-West University, 2012. http://hdl.handle.net/10394/9068.
Full textTelatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Full textNoyes, Alexander Hale. "Securing reform? : post-election power sharing and security sector reform in Zimbabwe, Kenya, and Togo, 2006-2013." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:d49f7715-486e-444f-ada3-ac82ff96db0b.
Full textDenney, Lisa. "Thin security? : the challenge of engaging informal security actors in DFID's security sector reform programme in Sierra Leone." Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/2a246333-453e-4ee3-b714-7a53c3e9eeb7.
Full textFielder, Jesse K. "Does Procedural Justice Matter in the Private Security Sector?: Comparing Public Perceptions of the Private Security and Public Policing Sector." Thesis, Griffith University, 2020. http://hdl.handle.net/10072/398873.
Full textNyamnjoh, Anye-Nkwenti. "Local ownership and democratic governance in security sector reform." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/24924.
Full textBooks on the topic "Security Section"
United States. Executive Office of the President., ed. Health Security Act section-by-section analysis. [Executive Office of the President], 1993.
Find full textBrewer, Dennis C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance. John Wiley & Sons, Ltd., 2005.
Find full textDaniel, Kent. Covariance risk, mispricing, and the cross section of security returns. National Bureau of Economic Research, 2000.
Find full textUnited States. Congress. Senate. Committee on Finance. Amendments to section 1619 of the Social Security Act: Report (to accompany S. 2209). U.S. G.P.O., 1986], 1986.
Find full textOffice, Home. Reform of Section 2 of the Official Secrets Act 1911. H.M.S.O., 1988.
Find full textQuarterman, John S. Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance. John Wiley & Sons, Ltd., 2007.
Find full textOregon Dept. of State Police Tribal Gaming Section. Oregon State Police Tribal Gaming Section: Billings audit. Secretary of State, Audits Division, 2006.
Find full textMaine. Office of Health Planning and Development. Procedures manual, Section 1122 of the Social Security Act: Effective September 4, 1985. Maine Dept. of Human Services, Office of Health Planning and Development, 1985.
Find full textSecurity, Great Britain Department of Health and Social. Uprating of mobility allowance: Statement prepared pursuant to section 37A(4) of the Social Security Act 1975 as amended by section 3(2) of the Social Security Act 1979. H.M.S.O., 1985.
Find full textBook chapters on the topic "Security Section"
Knott, Eugene F. "Test Security." In Radar Cross Section Measurements. Springer US, 1993. http://dx.doi.org/10.1007/978-1-4684-9904-9_13.
Full textMurphy, Christopher J. "Approaching Section V." In Security and Special Operations. Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230625532_6.
Full textBonser, Charles F. "Introduction, Section I." In Security, Trade, and Environmental Policy. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4399-2_1.
Full textBonser, Charles F. "Introduction, Section II." In Security, Trade, and Environmental Policy. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4399-2_14.
Full textBonser, Charles F. "Introduction, Section III." In Security, Trade, and Environmental Policy. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4399-2_20.
Full textThomsen, Dan. "Introduction to Security and Policy Section." In Handbook of Human Computation. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8806-4_66.
Full textMurphy, Christopher J. "The Origins and Development of SOE’s Security Section." In Security and Special Operations. Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230625532_1.
Full textSchlenker, Wolfram. "Crop Responses to Climate and Weather: Cross-Section and Panel Models." In Climate Change and Food Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2953-9_6.
Full textLópez Gunn, Elena, Laura Vay, and Carlos Marcos. "A Reader’s Guide to Natural Assurance Schemes." In Water Security in a New World. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_2.
Full textWagner, Lars, and Dieter Wehe. "The Establishment of the International Police Relations Section at the German Police University—An Investment in the Present and the Future." In International Security Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42523-4_37.
Full textConference papers on the topic "Security Section"
Vermani, Lovkesh Singh, Blessy Thankachan, Anooja A., Preeti Purohit, Abhijeet Kumar, and Garima Jolly. "Blockchain-Nanotechnology Integration: Securing the Future through Enhanced Credibility and Security." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866067.
Full textBhandari, Vedant, Hemant Mahale, Prem Bhutada, Shivaji Harne, Aniket Narsale, and Pallavi Deshpande. "Sensitive Security: The Next Generation Alarm System." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895525.
Full textTian, Dongping, Chen Liu, and Tuersunjiang Yimamu. "Chaotic particle swarm optimization with golden section strategy." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061595.
Full textSangekar, Avinash, Vaibhav Gumalwad, Shreyash Khillare, Kartik Warbhog, Shivhar Hadbe, and Umakant Tupe. "Blockchain-Powered Forensic Evidence Storage: A New Approach to Data Security." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895214.
Full textSathiyamoorthi, A. S. Anishvishwa, S. Rahul Senthil, Sudha Vittaldass, and Raja Raman. "Anti-Theft Alert System for Home Security." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10867266.
Full textMaity, Sourav, and Jatin Arora. "The Colossal Defense: Security Challenges of Large Language Models." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866433.
Full textBodat, Harshil, Harshil Patel, Monika Arora, Dhruti Ambekar, Sonu Bodat, and Sonia. "AES-Driven Image Encryption: Overcoming Security and Transmission Challenges." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866928.
Full textC, Pavithra H., and Rajeshwari J. "A Comprehensive IoT Security Framework Empowered by Machine Learning." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866748.
Full textNixon, J. Sebastian, J. Jeya A. Celin, Senthil Kumar A, C. Ganesh, U. Pavan Kumar, and Dilip Kumar. "LoRaWAN Security Framework to Mitigate DoS Attacks at the Gateway Level using Machine Learning." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895108.
Full textChriki, F. Z., E. Simó, F. Aguiló, I. Garcia-Milà, and X. Masip. "A Deep Learning Framework for Safety Monitoring of a Railway Section." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679387.
Full textReports on the topic "Security Section"
Daniel, Kent, David Hirshleifer, and Avanidhar Subrahmanyam. Covariance Risk, Mispricing, and the Cross Section of Security Returns. National Bureau of Economic Research, 2000. http://dx.doi.org/10.3386/w7615.
Full textBasbugoglu, Tarik, Roland Fazekas, and Marcus Nicolson. Security Forces Radicalisation Report. Glasgow Caledonian University, 2025. https://doi.org/10.59019/xqhnf105.
Full textShull, D., and M. Lane. Use of Data Libraries for IAEA Nuclear Security Assessment Methodologies (NUSAM) [section 5.4]. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1229806.
Full textReno, Ron, Harold Drollinger, Maureen L. King, and Colleen M. Beck. A Section 106 Evaluation of Building CP-1, Area 6, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1573363.
Full textRamírez Rodríguez, Santiago. Violence and Crime in Nicaragua: A Country Profile. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0006969.
Full textWedding, Jeffrey, and Susan Edwards. Section 110 Documentation of a Douglas AD-2 Skyraider Crash Site, Area 1, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1836548.
Full textBolton, Laura. Synthesis of Work by the Covid Collective. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/cc.2022.001.
Full textKeach, Levi. A Section 110 Evaluation of Three Sites Associated with the Grable Test, Area 5, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1821223.
Full textColeman-Jensen, Alisha, and Matthew P. Rabbit. Analysis of the Current Population Survey Food Security Supplement Split-Panel Test. Economic Research Service, U.S. Department of Agriculture, 2023. http://dx.doi.org/10.32747/2023.8134354.ers.
Full textReno, Ron, Maureen King, and Cheryl Collins. A Section 106 Evaluation of the Mercury Bowling Alley, Area 23, Nevada National Security Site, Nye County, Nevada, with Photographic Documentation Addendums. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1482738.
Full text