Academic literature on the topic 'State Security Service'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'State Security Service.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "State Security Service"
Sundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (August 30, 2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.
Full textGuracha, Adan Moro, and Felix Kiruthu. "Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya." International Journal of Current Aspects 3, no. III (June 5, 2019): 1–13. http://dx.doi.org/10.35942/ijcab.v3iiii.26.
Full textBorichev, Konstantin, and Mihail Pavlik. "The role of State Security bodies in countering terrorism." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 1 (April 9, 2021): 94–103. http://dx.doi.org/10.35750/2071-8284-2021-1-94-103.
Full textOtinashvili, Ramaz. "Security in Company Management." Works of Georgian Technical University, no. 2(520) (June 25, 2021): 67–75. http://dx.doi.org/10.36073/1512-0996-2021-2-67-75.
Full textHordiienko, Serhii. "Powers of government agencies in ensuring the security of the state and directions of their improvement." Legal Ukraine, no. 10 (November 27, 2020): 6–17. http://dx.doi.org/10.37749/2308-9636-2020-10(214)-1.
Full textBarić, Nikica. "State Security of Socialist Republic of Croatia and events in Poland 1980-1982." Balcanica Posnaniensia. Acta et studia 28, no. 2 (December 31, 2021): 117–39. http://dx.doi.org/10.14746/bp.2021.28.23.
Full textKamiński, Mariusz Antoni. "Intelligence and counterintelligence in the structure of the state organs of the Republic of Estonia." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 121–34. http://dx.doi.org/10.34739/dsd.2019.01.09.
Full textMehta, Meera, Dinesh Mehta, and Jaladhi Vavaliya. "Urban drinking water security in Gujarat." Journal of Social and Economic Development 23, S1 (February 18, 2021): 166–80. http://dx.doi.org/10.1007/s40847-020-00122-0.
Full textNielsen, Christian Axboe. "The Yugoslav State Security Service and the Bleiburg Commemorations." Politička misao 55, no. 2 (June 19, 2018): 50–70. http://dx.doi.org/10.20901/pm.55.2.03.
Full textKondrashova, Nataliia. "LEGAL REGULATION OF DISCOVERY UKRAINE'S SECURITY SERVICE THREATS ECONOMIC SECURITY OF THE STATE." Entrepreneurship, Economy and Law, no. 7 (2019): 99–103. http://dx.doi.org/10.32849/2663-5313.2019.7.17.
Full textDissertations / Theses on the topic "State Security Service"
Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.
Full textTengeni, Tamsanqa Edgar. "The state of governmental relations with reference to decentralisation of public safety and security service delivery in the Free State / by Tamsanqa Edgar Tengeni." Thesis, North-West University, 2007. http://hdl.handle.net/10394/2539.
Full textInbar, Reuven. "Relationship between participation in a service enrichment and fitness programme and physical performance of state security personnel in stressful situations." Thesis, Anglia Ruskin University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268422.
Full textMungwashu, Sthembiso Handinawangu. "A learning state?: a case study of the post-1994 South African welfare regime." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1003113.
Full textBernard, Duguet Nicolas. "Les directeurs de prison : discipline et régulation dans l'administration." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAD009.
Full textDuring the 20thcentury, the professional identity of prison directors has undergone a rapid and radical evolution. This evolution was caused by questioning the role and the functioning of the penal prison in the development of liberalism. The period, beginning in the 1970's, inaugurates the mutation of the identity crises and its reformation. To be able to comprehend the logical development of this proces of adaptation, one most place it in theframework of governmentality. The « governmentality » in this case is seen in two of its dimensions as defined by Michel Foucault. Firstly, as a phase of the contempory period beginning at the French Revolution. Secondly, as a technique of authority : the biopolitics realized by a process of regulation. In this framework, a study of the evolution of the professional identity of prisons directors, in and by « governmentality », explains the mechanisms leading to the weakening of the disciplinary authority, and the increased power of regulation systems, both on administrative and penal levels. The prison directors become, in turns, either objects or actors of these two ways of governing
Eicher, Michael. "Protecting diplomats in Iraq what can the U.S. Department of State do to improve it's management and oversight of security contractors in Iraq? /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491053.
Full textMvé, ebang Bruno. "Politique étrangère et sécurité nationale d'un petit État : analyse de l'action du Gabon pour la paix et la sécurité en Afrique Centrale, une politique extérieure au service de la construction et de la préservation de l'intérieur." Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30018.
Full textAfrica is the region of the world, in which, exists the largest number of bloody armed crises. Since the independences, this region has never really known peace and security in all its regional entities. In this somber african board, Central Africa occupies an unenviable place. Abandoned in its sad fate at the end of the Cold War, countries, such as the Gabon, decided to direct particularly their foreign policy with the aim of helping states in crises, of its immediate environment, to cover a certain stability But especially in a logic of national reassurance. Small country of Central Africa, the Gabon feels the effects of the persistent regional instability. This Gabonese commitment for the peace was not born with its entry in the sovereignty. It built itself over the years. Its action for its building and national security has never aimed at reproducing exactly the same model of stability which it can but only arrive at the silence of weapons. It is obvious that as any political commitment, the gabonese regional action presents certain limits and the state should take measures aiming at a better international assertion. Nevertheless, the action of such country is important because by prioritizing the dialogue, they supply a painstaking job which manages, all the same, to put an end to the bloodsheds and to their tendency to the overflowing
Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textThesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
Clipson, Edmund Bede. "Constructing an intelligence state : the colonial security services in Burma, 1930-1942." Thesis, University of Exeter, 2010. http://hdl.handle.net/10036/98382.
Full textJešuta, Martin. "Analýza efektivity e-služeb veřejné správy ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-85134.
Full textBooks on the topic "State Security Service"
Omand, David. Securing the state: National security in contemporary times. Singapore: S. Rajaratnam School of International Studies, 2012.
Find full textPeter, Gill. Policing politics: Security intelligence and the liberal democratic state. London: F. Cass, 1994.
Find full textGuo, Xuezhi. China's security state: Philosophy, evolution, and politics. Cambridge: Cambridge University Press, 2012.
Find full textThe lesser terror: Soviet state security, 1939-1953. Westport, Conn: Praeger, 1996.
Find full textParrish, Michael. The lesser terror: Soviet state security, 1939-1953. Westport, Conn: Praeger, 1996.
Find full textMilosavljević, Bogoljub. Secret files: Opening the files of state security services. Belgrade: Center for Antiwar Action, 2002.
Find full textMilosavljević, Bogoljub. Secret files: Opening the files of state security services. Belgrade: Center for Antiwar Action, 2002.
Find full textHarris, Shane. The watchers: The rise of America's surveillance state. New York: Penguin Press, 2010.
Find full textHarris, Shane. The watchers: The rise of America's surveillance state. New York: Penguin Press, 2010.
Find full textHarris, Shane. The watchers: The rise of America's surveillance state. New York: Penguin Press, 2010.
Find full textBook chapters on the topic "State Security Service"
Wang, XiaoFeng. "Memory and State Exhaustion Denial of Service." In Encyclopedia of Cryptography and Security, 773–74. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_270.
Full textSrinivasan, Avinash, and Frank Ferrese. "Forensics-as-a-Service (FaaS) in the State-of-the-Art Cloud." In Security, Privacy, and Digital Forensics in the Cloud, 321–37. Singapore: John Wiley & Sons Singapore Pte. Ltd, 2019. http://dx.doi.org/10.1002/9781119053385.ch16.
Full textThurlow, Richard C. "The Security Service, the Communist Party of Great Britain and British Fascism, 1932–51." In British Fascism, the Labour Movement and the State, 27–45. London: Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230522763_3.
Full textIzvarina, Nataliya, and Darya Pilyuk. "USING CONTROL PROCEDURES IN THE BUSINESS SECURITY SYSTEM." In Business security management in modern conditions, 145–51. au: AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635bee2d1.66904868.
Full textSun, Ronghua, Qianxun Wang, and Liang Guo. "Research Towards Key Issues of API Security." In Communications in Computer and Information Science, 179–92. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_11.
Full textVedder, Klaus. "GSM: Security, Services, and the SIM." In State of the Art in Applied Cryptography, 224–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_10.
Full textAccaoui Lorfing, Pascale. "Screening of Foreign Direct Investment and the States’ Security Interests in Light of the OECD, UNCTAD and Other International Guidelines." In Public Actors in International Investment Law, 179–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-58916-5_10.
Full textReisner, Robert A. F. "Homeland Security Brings Ratepayer vs. Taxpayer to Center Stage." In Postal and Delivery Services: Delivering on Competition, 223–42. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0233-3_12.
Full textKrasznahorkai, Kata. "‘The Reconstruction of the Past is the Task of Historians and not Agents’." In Cultural Inquiry, 29–36. Berlin: ICI Berlin Press, 2022. http://dx.doi.org/10.37050/ci-21_04.
Full textFleischer, Julia. "Federal Administration." In Public Administration in Germany, 61–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-53697-8_5.
Full textConference papers on the topic "State Security Service"
Ellis, Todd. "Security As a Service for Rail Applications." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8027.
Full textYuan, Fenglin, and Yusheng Kong. "An Empirical Study of State-Owned Capital Security Management: From the Perspective of Internal Control." In 2010 International Conference on Management and Service Science (MASS 2010). IEEE, 2010. http://dx.doi.org/10.1109/icmss.2010.5578269.
Full textMikhnev, Ilia Pavlovich, and Svetlana Vladimirovna Mikhneva. "Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation." In International Research-to-practice conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32617.
Full textFenglan Chen, Yongjun Shen, Guidong Zhang, and Xin Liu. "The network security situation predicting technology based on the small-world echo state network." In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615328.
Full textTvaronavičienė, Manuela. "If Clustering Impacts Energy Security: Case of Service Sector in Selected Countries." In Contemporary Issues in Business, Management and Education. Vilnius Gediminas Technical University, 2017. http://dx.doi.org/10.3846/cbme.2017.021.
Full textPhakathi, Thulani, Francis Lugayizi, and Michael Esiefarienrhe. "Quality of Service-Aware Security Framework for Mobile Ad Hoc Networks using Optimized Link State Routing Protocol." In 7th International Conference on Computer Science, Engineering and Information Technology (CSEIT 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101109.
Full textRetamosa, Marta, Ángel Millán, Juan Antonio García, and María Millán. "Internal branding at university: Do tenure and job security matter?" In Sixth International Conference on Higher Education Advances. Valencia: Universitat Politècnica de València, 2020. http://dx.doi.org/10.4995/head20.2020.11092.
Full textИзварина, Наталия, Nataliya Izvarina, Анастасия Калинина, and Anastasiya Kalinina. "THE CONSTRUCTION OF THE SYSTEM OF INTERNAL AUDIT IN THE ECONOMIC SECURITY OF BUSINESS." In Modern problems of an economic safety, accounting and the right in the Russian Federation. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/conferencearticle_5c50600fe5a814.80843632.
Full textMiladinović Drobnič, Snežana. "SAVREMENA USLUŽNA PRAVILA I VLADAVINA PRAVA." In XVII majsko savetovanje. Pravni fakultet Univerziteta u Kragujvcu, 2021. http://dx.doi.org/10.46793/uvp21.041m.
Full textLIU, JIE, and CHANG-CHEN GAO. "ANALYSIS OF GOVERNMENT PROVIDING PUBLIC EMPLOYMENT SERVICE UNDER THE NEW EMPLOYMENT PATTERN." In 2021 International Conference on Education, Humanity and Language, Art. Destech Publications, Inc., 2021. http://dx.doi.org/10.12783/dtssehs/ehla2021/35727.
Full textReports on the topic "State Security Service"
Cantens, Thomas, and Gaël Raballand. Taxation and Customs Reforms in Fragile States: Between Bargaining and Enforcement. Institute of Development Studies (IDS), May 2021. http://dx.doi.org/10.19088/ictd.2021.009.
Full textThomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.
Full textCarlson, John. Nuclear verification in a Middle East WMD-Free Zone: Lessons from Past Verification Cases and Other Precedents. The United Nations Institute for Disarmament Research, January 2021. http://dx.doi.org/10.37559/wmdfz/21/nv/01.
Full textLambermont, Serge, and Niels De Boer. Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure. SAE International, December 2021. http://dx.doi.org/10.4271/epr2021030.
Full textBackstrom, Robert, and David Dini. Firefighter Safety and Photovoltaic Systems Summary. UL Firefighter Safety Research Institute, November 2011. http://dx.doi.org/10.54206/102376/kylj9621.
Full textBackstrom, Robert, and David Backstrom. Firefighter Safety and Photovoltaic Installations Research Project. UL Firefighter Safety Research Institute, November 2011. http://dx.doi.org/10.54206/102376/viyv4379.
Full textLazonick, William, Philip Moss, and Joshua Weitz. The Unmaking of the Black Blue-Collar Middle Class. Institute for New Economic Thinking Working Paper Series, May 2021. http://dx.doi.org/10.36687/inetwp159.
Full textHoward, Joanna. Vulnerability and Poverty During Covid-19: Religious Minorities in India. Institute of Development Studies (IDS), November 2021. http://dx.doi.org/10.19088/creid.2021.014.
Full textKerber, Steve. Study of the Effectiveness of Fire Service Vertical Ventilation and Suppression Tactics in Single Family Homes. UL Firefighter Safety Research Institute, June 2013. http://dx.doi.org/10.54206/102376/iwzc6477.
Full textKerber, Steve. Impact of Ventilation on Fire Behavior in Legacy and Contemporary Residential Construction. UL Firefighter Safety Research Institute, December 2014. http://dx.doi.org/10.54206/102376/gieq2593.
Full text