To see the other types of publications on this topic, follow the link: Security Thread.

Books on the topic 'Security Thread'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security Thread.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jalal, Massouda. Hanging by a thread: Afghan women's rights and security threats. IFFRAS, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jalal, Massouda. Hanging by a thread: Afghan womens rights and security threats. Gyan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Remerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Police, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

S, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

III, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

National Defense University. Africa Center for Strategic Studies, ed. Boko Haram's evolving threat. Africa Center for Strategic Studies, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Anthony, Ian. Reducing threats at the source: A European perspective on cooperative threat reduction. Oxford University Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kiesbye, Stefan. Is Iran a threat to global security? Edited by Kiesbye Stefan. Greenhaven Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Nayar, V. K. Threat from within: India's internal security environment. Lancer Publishers, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dupont, Alan. Australia's threat perceptions: A search for security. Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Francis, Samuel T. Illegal immgration: A threat to US security. Centre for Security and Conflict Studies, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Francis, Samuel T. Illegal immigration - a threat to US security. Centre for Security and Conflict Studies, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Adolfo, Leyva de Varona, ed. Cuba: Assessing the threat to U.S. security. Endowment for Cuban American Studies, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Suggs, Robert C. Glasnost, perestroika, and the Soviet threat. USIC Educational Foundation, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Whitmore, D. C. Characterization of the nuclear proliferation threat. D.C. Whitmore, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Barnett, Dana, and Efraim Karsh. Soft Threats to National Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Probst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Silva, Mario. Hanging by a Thread: Afghan's Rights and Security Post 2014. Mosaic Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pasqualetti, Martin J. The Thread of Energy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780199394807.001.0001.

Full text
Abstract:
The Thread of Energy simplifies the world’s complexity by recognizing energy as the single most important influence on human behavior. It exposes how fundamental is energy on our lives, our security, and our relationships with others in an ever-shrinking and complicated world. It examines the typical inspiration energy has on all activities, ways of life, ambitions, and costs while illustrating its central role in explaining how the world works and how it will influence the future we are creating. It reduces the myriad interlocking and inscrutable effects on human security and happiness while
APA, Harvard, Vancouver, ISO, and other styles
26

Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Schoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Schoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Agency, International Atomic Energy. National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements (Arabic Edition). International Atomic Energy Agency, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Decision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Agency, International Atomic Energy. National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: IAEA Nuclear Security Series No. 10-G. International Atomic Energy Agency, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wilson, Orlando, Dwane Phillips, Hector LaSoya, and Kieron Frampton. Caribbean Security Threats: A Threat Assessment for Islands of the Caribbean. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hasseler, Bjorn. Security Threats. 1632, Inc., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hasseler, Bjorn. Security Threats. 1632, Inc., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Verton, Daniel. Critical Threads: IT*Security. Lulu.com, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Liller, Harry. Threat to National Security. Page Publishing Inc., 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cyber Threat. Warwick Publishing, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Thomas, Ciza, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés, eds. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dunn Cavelty, Myriam. Cyber-Security and Threat Politics. Routledge, 2007. http://dx.doi.org/10.4324/9780203937419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sharma, Gautam. India's Security: Super Power Threat. Stosius Inc/Advent Books Division, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Shirkey, Zachary C., and Ivan Savic. Uncertainty Threat and International Security. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Shostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Shostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Maj. Gen. Dr Virinder Uberoy. Threat Perception for National Security. UBSPD, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Shostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Verton, Dan. Critical Threads 2006: IT*Security. Lulu.com, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Brannan, David W., and David Tucker. Unconventional Threat to Homeland Security. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Threat modeling: Designing for security. Wiley, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bronk, Chris. Cyber Threat. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636455.

Full text
Abstract:
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners
APA, Harvard, Vancouver, ISO, and other styles
50

Herd, Graeme P. Soft Security Threats and European Security. Routledge, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!