Academic literature on the topic 'Security state'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security state.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security state"
Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Full textWiśniewski, Bernard. "NATIONAL SECURITY AND STATE SECURITY (REMINISCENCES)." Bulletin of Lviv State University of Life Safetyі 27 (June 26, 2023): 144–49. http://dx.doi.org/10.32447/20784643.27.2023.16.
Full textIevgeniia, Mishchuk. "DEVELOPMENT OF MODERN DIRECTIONS OF ESTIMATOLOGY IN THE ECONOMIC SECURITY OF THE ENTERPRISE." TECHNOLOGY AUDIT AND PRODUCTION RESERVES 6, no. 4(56) (2020): 22–28. https://doi.org/10.15587/2706-5448.2020.220332.
Full textAgwanwo, Destiny Eze, and Raphael Lawal. "Non-state Security Actors and Security Governance in Taraba State." Middle East Research Journal of Humanities and Social Sciences 5, no. 02 (2025): 41–48. https://doi.org/10.36348/merjhss.2025.v05i02.004.
Full textOghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.
Full textAziz, Sahar. "State Sponsored Radicalization." Michigan Journal of Race & Law, no. 27.1 (2021): 125. http://dx.doi.org/10.36643/mjrl.27.1.state.
Full textOnyshchenko, Svitlana. "State Budgetary Security Determinants." ЕКОНОМІКА І РЕГІОН Науковий вісник, no. 4(75) (December 27, 2019): 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.
Full textGanguly, Sumit. "The Troublesome Security State." Journal of Democracy 28, no. 3 (2017): 117–26. http://dx.doi.org/10.1353/jod.2017.0050.
Full textCollins, Alan. "State-Induced Security Dilemma." Cooperation and Conflict 39, no. 1 (2004): 27–44. http://dx.doi.org/10.1177/0010836704040833.
Full textKudelia, Serhiy. "Ukraine's Emerging Security State." Current History 117, no. 801 (2018): 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.
Full textDissertations / Theses on the topic "Security state"
Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.
Full textMajumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.
Full textRockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.
Full textFitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.
Full textGordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.
Full textGordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.
Full textWoodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.
Full textShamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.
Full textBlackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.
Full textFugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.
Full textBooks on the topic "Security state"
Hong, Yong-Pyo. State Security and Regime Security. Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Full textOmand, David. Securing the state: National security in contemporary times. S. Rajaratnam School of International Studies, 2012.
Find full textS. Rajaratnam School of International Studies, ed. Securing the state: National security in contemporary times. S. Rajaratnam School of International Studies, Nanyang Technological University, 2012.
Find full textD, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.
Find full textauthor, Kotwal Navaz, and Commonwealth Human Rights Initiative, eds. State security commissions: Reform derailed. Commonwealth Human Rights Initiative, 2011.
Find full textAnna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. Continuum, 2009.
Find full textCañas, Dick. HOMELAND SECURITY AT THE STATE LEVEL: A Primer on State Homeland Security Programs. authorHOUSE, 2012.
Find full textMeyerowitz, Steven A. State by state privacy and data security law. Sheshunoff, 2009.
Find full textBook chapters on the topic "Security state"
Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_126-1.
Full textBarnett, Hilaire. "State Security." In Constitutional and Administrative Law, 15th ed. Routledge, 2023. http://dx.doi.org/10.4324/9781003360438-27.
Full textRegilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_126.
Full textPaul, Erik. "Security State." In Australia as US Client State. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137469359_4.
Full textBarnett, Hilaire. "State Security." In Constitutional & Administrative Law. Routledge, 2017. http://dx.doi.org/10.4324/9781315458373-27.
Full textBarnett, Hilaire. "State Security." In Constitutional & Administrative Law. Routledge, 2019. http://dx.doi.org/10.4324/9780429322686-22.
Full textBarnett, Hilaire. "State Security." In Constitutional and Administrative Law, 16th ed. Routledge, 2025. https://doi.org/10.4324/9781003519027-27.
Full textRomero, Vidal. "Security." In Rebuilding the State Institutions. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31314-2_6.
Full textKettunen, Pauli. "Welfare state, competition state, security state." In Remapping Security on Europe’s Northern Borders. Routledge, 2021. http://dx.doi.org/10.4324/9781003096412-14.
Full textFraser, Trudy. "Human Security as State Security." In Maintaining Peace and Security? Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-03215-7_8.
Full textConference papers on the topic "Security state"
Andreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.
Full textBodden, Eric. "State of the systems security." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3183440.3183462.
Full textLisovskyi, Volodymyr Mykolayovych. "State policy of national security." In MARITIME SECURITY OF THE BALTIC-BLACK SEA REGION: CHALLENGES AND THREATS. Baltija Publishing, 2023. http://dx.doi.org/10.30525/978-9934-26-392-7-1.
Full textFrey, Michael R., and Jaclyn D. Szymonifka. "A Gaussian quantum state discriminator." In Defense and Security, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2005. http://dx.doi.org/10.1117/12.604340.
Full textSimonaitis-Castillo, Vida K. "State of the art of crystal growth in the United States." In SPIE Defense, Security, and Sensing, edited by Mark Dubinskii and Stephen G. Post. SPIE, 2010. http://dx.doi.org/10.1117/12.849223.
Full textGrunnan, Tonje, Monica Endregard, Ragnhild E. Siedler, and Ann-Kristin Elstad. "Norwegian Societal Security and State Security – Challenges and Dilemmas." In Proceedings of the 29th European Safety and Reliability Conference (ESREL). Research Publishing Services, 2020. http://dx.doi.org/10.3850/978-981-14-8593-0_4467-cd.
Full textHeremans, Joseph P. "Introduction to cryogenic solid state cooling." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2228756.
Full textSuh, DongHyok, and Young-Hwan Oh. "Crime Prevention Using Individual’s State Estimation." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.73.
Full textSendobry, Alexander, Thorsten Graber, and Uwe Klingauf. "Purely optical navigation with model-based state prediction." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864686.
Full textWagner, Matthias, Eugene Ma, John Heanue, and Shuyun Wu. "Solid state optical thermal imagers." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.730274.
Full textReports on the topic "Security state"
Jablonsky, David. The State of the National Security State. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408224.
Full textJablonsky, David. The State of the National Security State. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408437.
Full textCheeseman, Kathryn. Approaches to State Fragility and Climate Security. Institute of Development Studies, 2025. https://doi.org/10.19088/k4dd.2025.057.
Full textFeng, Shaw C., and Simon P. Frechette. The state of container security standards. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7153.
Full textChow, William. Fixing the Broken State of Mobile Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas009.
Full textMarcella, Gabriel. Affairs of State: The Interagency and National Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada491602.
Full textMiller, Jack, and Rowena Bermingham. Regulation and state use of social media. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs29.
Full textMikaelsen, Dallas P. U.S.-Brazil Security Cooperation and the State Partnership Program. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1012803.
Full textBusch, Oberst G. German-Israeli Relations: Security of Israel--Reason of State? Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589061.
Full textTulak, Arthur N., R. W. Kraft, and Don Silbaugh. State Defense Forces: Forces for NORTHCOM and Homeland Security? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada421654.
Full text