Artículos de revistas sobre el tema "Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Texto completoNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Texto completoPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Texto completoAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Texto completoBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Texto completoNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Texto completoKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Texto completoMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Texto completoWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Texto completoEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Texto completoMuhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Texto completoMuhammad, Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. https://doi.org/10.5281/zenodo.8109753.
Texto completoTOMÁŠEK, Martin. "Security Properties Verification of Security Protocols." Acta Electrotechnica et Informatica 14, no. 2 (2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.
Texto completoHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Texto completoDynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.
Texto completoWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Texto completoNeamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.
Texto completoKharb, Latika, and Deepak Chahal. "Cloud Access Security Brokers: Strengthening Cloud Security." International Journal of Research Publication and Reviews 4, no. 8 (2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.
Texto completoAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.
Texto completoClough, Patricia Ticineto, and Craig Willse. "Gendered Security/National Security." Social Text 28, no. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.
Texto completoElliott, Lorraine. "Human security/environmental security." Contemporary Politics 21, no. 1 (2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.
Texto completoPasquinucci, Andrea. "Defeating security with security." Computer Fraud & Security 2008, no. 2 (2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.
Texto completoKeeley, James F. "Review: Security: Writing Security." International Journal: Canada's Journal of Global Policy Analysis 48, no. 3 (1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.
Texto completoSrinivas, Adilapuram. "Unveiling Modern Authentication Strategies for Java APIs: Exploring OAuth 2.0, JWT, API Keys, and Basic Authentication." Journal of Scientific and Engineering Research 9, no. 9 (2022): 119–25. https://doi.org/10.5281/zenodo.14631323.
Texto completoChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Texto completoHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Texto completoOthman, Sadeq. "Securing Robotic Communication using Multiple Security Techniques." International Journal of Computer Applications 178, no. 1 (2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.
Texto completoAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Texto completoRomero Ortiz, María Elena, and Carlos Uscanga Prieto. "Japan: Securing Cooperation or Cooperating to Security?" México y la Cuenca del Pacífico 5, no. 14 (2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.
Texto completoSingh, Ritesh, Lalit Kumar, Debraj Banik, and S. Sundar. "Smart security and securing data through watermarking." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.
Texto completoSri, Harsha Vardhan Sanne. "Securing the Helm: Navigating Container Security in Kubernetes." European Journal of Advances in Engineering and Technology 9, no. 3 (2022): 167–71. https://doi.org/10.5281/zenodo.11906265.
Texto completoShin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.
Texto completoRushton, Simon. "Global Health Security: Security for whom? Security from what?" Political Studies 59, no. 4 (2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.
Texto completoMetodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.
Texto completoToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Texto completoAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.
Texto completoKyung-Im Cho. "Security Deposit as Collateral Security." Korean Lawyers Association Journal 64, no. 12 (2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.
Texto completoHOFREITER, Ladislav. "SECURITY CULTURE AND SECURITY MANAGEMENT." Krízový Manažment 14, no. 2 (2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.
Texto completoINTRILIGATOR, MICHAEL D. "GLOBAL SECURITY AND HUMAN SECURITY." International Journal of Development and Conflict 01, no. 01 (2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.
Texto completoJohansen, Robert C. "Real Security is Democratic Security." Alternatives: Global, Local, Political 16, no. 2 (1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.
Texto completoMalcolmson, Robert W. "Review: International Security: Alternative Security." International Journal: Canada's Journal of Global Policy Analysis 46, no. 4 (1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.
Texto completoCohen, Fred. "Strategic Security Intelligence — Embedded Security." Network Security 2002, no. 2 (2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.
Texto completoLeach, Dr John. "Security engineering and security RoI." Computers & Security 22, no. 6 (2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.
Texto completoMeyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Texto completoSØRENSEN, GEORG. "Individual Security and National Security." Security Dialogue 27, no. 4 (1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.
Texto completoTrzciński, Łukasz, and Juliusz Piwowarski. "Security culture and security anthropology." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, no. 33 (2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.
Texto completoStosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Texto completoFekete, Liz. "Peoples' Security Versus National Security." Race & Class 44, no. 3 (2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.
Texto completoPerlmutter, Amos, and Benjamin Frankel. "SECURITY STUDIES and Security Studies." Security Studies 1, no. 1 (1991): iv. http://dx.doi.org/10.1080/09636419109347452.
Texto completoSoneji, Samir, and Gary King. "Statistical Security for Social Security." Demography 49, no. 3 (2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.
Texto completo