Books on the topic 'Security Thread'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security Thread.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jalal, Massouda. Hanging by a thread: Afghan women's rights and security threats. IFFRAS, 2014.
Find full textJalal, Massouda. Hanging by a thread: Afghan womens rights and security threats. Gyan, 2016.
Find full textRemerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.
Find full textPolice, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.
Find full textUnited States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.
Find full textS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.
Find full textS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.
Find full textUnited States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.
Find full text1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.
Find full textIII, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.
Find full textNational Defense University. Africa Center for Strategic Studies, ed. Boko Haram's evolving threat. Africa Center for Strategic Studies, 2012.
Find full textAnthony, Ian. Reducing threats at the source: A European perspective on cooperative threat reduction. Oxford University Press, 2004.
Find full textKiesbye, Stefan. Is Iran a threat to global security? Edited by Kiesbye Stefan. Greenhaven Press, 2010.
Find full textNayar, V. K. Threat from within: India's internal security environment. Lancer Publishers, 1992.
Find full textDupont, Alan. Australia's threat perceptions: A search for security. Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1991.
Find full textFrancis, Samuel T. Illegal immgration: A threat to US security. Centre for Security and Conflict Studies, 1986.
Find full textFrancis, Samuel T. Illegal immigration - a threat to US security. Centre for Security and Conflict Studies, 1986.
Find full textAdolfo, Leyva de Varona, ed. Cuba: Assessing the threat to U.S. security. Endowment for Cuban American Studies, 2001.
Find full textSuggs, Robert C. Glasnost, perestroika, and the Soviet threat. USIC Educational Foundation, 1990.
Find full textWhitmore, D. C. Characterization of the nuclear proliferation threat. D.C. Whitmore, 1994.
Find full textBarnett, Dana, and Efraim Karsh. Soft Threats to National Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textJones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Full textSilva, Mario. Hanging by a Thread: Afghan's Rights and Security Post 2014. Mosaic Press, 2014.
Find full textPasqualetti, Martin J. The Thread of Energy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780199394807.001.0001.
Full textSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textAgency, International Atomic Energy. National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements (Arabic Edition). International Atomic Energy Agency, 2022.
Find full textDecision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Find full textAgency, International Atomic Energy. National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: IAEA Nuclear Security Series No. 10-G. International Atomic Energy Agency, 2021.
Find full textWilson, Orlando, Dwane Phillips, Hector LaSoya, and Kieron Frampton. Caribbean Security Threats: A Threat Assessment for Islands of the Caribbean. Independently Published, 2019.
Find full textThomas, Ciza, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés, eds. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.
Full textDunn Cavelty, Myriam. Cyber-Security and Threat Politics. Routledge, 2007. http://dx.doi.org/10.4324/9780203937419.
Full textSharma, Gautam. India's Security: Super Power Threat. Stosius Inc/Advent Books Division, 1990.
Find full textShirkey, Zachary C., and Ivan Savic. Uncertainty Threat and International Security. Taylor & Francis Group, 2019.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textMaj. Gen. Dr Virinder Uberoy. Threat Perception for National Security. UBSPD, 2005.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textBrannan, David W., and David Tucker. Unconventional Threat to Homeland Security. Wiley & Sons, Incorporated, John, 2018.
Find full textBronk, Chris. Cyber Threat. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636455.
Full text