Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Security state.

Articles de revues sur le sujet « Security state »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Security state ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Texte intégral
Résumé :
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wiśniewski, Bernard. "NATIONAL SECURITY AND STATE SECURITY (REMINISCENCES)." Bulletin of Lviv State University of Life Safetyі 27 (June 26, 2023): 144–49. http://dx.doi.org/10.32447/20784643.27.2023.16.

Texte intégral
Résumé :
State security and homeland security are concepts that frequently appear in academic studies and are permanently enshrined in law. They are sometimes even treated as synonyms, despite sharing only a single element, that of security. Are they really identical concepts? Do they have relations indicating interpretative differences? Is there something common to these expressions that link them in their content? These are the questions that determined the formulation of the statements presented in this article, which reviews the standpoints of recognised Polish scholars, being supplemented by the a
Styles APA, Harvard, Vancouver, ISO, etc.
3

Ievgeniia, Mishchuk. "DEVELOPMENT OF MODERN DIRECTIONS OF ESTIMATOLOGY IN THE ECONOMIC SECURITY OF THE ENTERPRISE." TECHNOLOGY AUDIT AND PRODUCTION RESERVES 6, no. 4(56) (2020): 22–28. https://doi.org/10.15587/2706-5448.2020.220332.

Texte intégral
Résumé :
<em>The object of research is the process of developing directions in estimatology of the economic security of an enterprise. Multiple objects are taken into account in the estimatology of economic security. It is revealed that the presence of many approaches to determining liminal (recommended, desired) values when assessing indicators of economic security is due to their multitasking. It is substantiated that the detected multitasking generates multilevel and multi-persistence of economic security. The property of variability of the degree of rigidity of the liminal (recommended and other) v
Styles APA, Harvard, Vancouver, ISO, etc.
4

Agwanwo, Destiny Eze, and Raphael Lawal. "Non-state Security Actors and Security Governance in Taraba State." Middle East Research Journal of Humanities and Social Sciences 5, no. 02 (2025): 41–48. https://doi.org/10.36348/merjhss.2025.v05i02.004.

Texte intégral
Résumé :
This study explores the role of non-state security actors in security governance in Taraba State, Nigeria. It adopted the descriptive research design and the community involvement approach theory to examine the role of non-state security actors in Taraba State. It looks at how private security firms, and neighborhood watch groups, vigilantes, and tribal militias—such as the Tiv and Jukun groups support official security measures. The study used a multistage sample approach to choose seven LGAs where these actors are most active: Ardo Kola, Bali, Donga, Gashaka, Gassol, Ibi, and Jalingo. Key pa
Styles APA, Harvard, Vancouver, ISO, etc.
5

Oghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.

Texte intégral
Résumé :
Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and thr
Styles APA, Harvard, Vancouver, ISO, etc.
6

Aziz, Sahar. "State Sponsored Radicalization." Michigan Journal of Race & Law, no. 27.1 (2021): 125. http://dx.doi.org/10.36643/mjrl.27.1.state.

Texte intégral
Résumé :
Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from bre
Styles APA, Harvard, Vancouver, ISO, etc.
7

Onyshchenko, Svitlana. "State Budgetary Security Determinants." ЕКОНОМІКА І РЕГІОН Науковий вісник, no. 4(75) (December 27, 2019): 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.

Texte intégral
Résumé :
Бюджетна безпека держави обумовлюється низкою детермінантів, які визначають зміст, структуру та рівень її забезпечення. Визначено, що визначальними фактами забезпечення державного бюджету є фактори, загрози як екзогенного, так і ендогенного походження, а також причинно-наслідкові зв’язки, які прямо чи опосередковано визначають його рівень та складність процесів його забезпечення.Запропоновано перелік основних детермінант, що впливають на забезпечення бюджетної безпеки держави з урахуванням процесів глобалізації, конструктивного / руйнівного впливу факторів та загроз. Зазначається, що системати
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ganguly, Sumit. "The Troublesome Security State." Journal of Democracy 28, no. 3 (2017): 117–26. http://dx.doi.org/10.1353/jod.2017.0050.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Collins, Alan. "State-Induced Security Dilemma." Cooperation and Conflict 39, no. 1 (2004): 27–44. http://dx.doi.org/10.1177/0010836704040833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kudelia, Serhiy. "Ukraine's Emerging Security State." Current History 117, no. 801 (2018): 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Chandramouli, Ramaswamy, and Peter Mell. "State of security readiness." XRDS: Crossroads, The ACM Magazine for Students 16, no. 3 (2010): 23–25. http://dx.doi.org/10.1145/1734160.1734168.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Nelson, Cary. "The National Security State." Cultural Studies ↔ Critical Methodologies 4, no. 3 (2004): 357–61. http://dx.doi.org/10.1177/1532708603262788.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Roth, Frederick P. "Security beyond the state." African Security Review 20, no. 4 (2011): 56–58. http://dx.doi.org/10.1080/10246029.2011.630811.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Larsen, Kari. "Orwellian state of security." Infosecurity 6, no. 6 (2009): 16–19. http://dx.doi.org/10.1016/s1742-6847(09)70013-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Taylor, Roger. "Security and the state." New Scientist 191, no. 2568 (2006): 22. http://dx.doi.org/10.1016/s0262-4079(06)60413-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kuper, P. "The State of Security." IEEE Security and Privacy Magazine 3, no. 5 (2005): 51–53. http://dx.doi.org/10.1109/msp.2005.134.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Onyshchenko, Svitlana. "State Budgetary Security Determinants." Економіка і регіон/ Economics and region, no. 4(75) (December 27, 2019): 14–19. https://doi.org/10.26906/eip.2019.4(75).1807.

Texte intégral
Résumé :
Бюджетна безпека держави обумовлюється низкою детермінантів, які визначають зміст, структуру та рівень її забезпечення. Визначено, що визначальними фактами забезпечення державного бюджету є фактори, загрози як екзогенного, так і ендогенного походження, а також причинно-наслідкові зв’язки, які прямо чи опосередковано визначають його рівень та складність процесів його забезпечення.Запропоновано перелік основних детермінант, що впливають на забезпечення бюджетної безпеки держави з урахуванням процесів глобалізації, конструктивного / руйнівного впливу факторів та загроз. Зазначається, що системати
Styles APA, Harvard, Vancouver, ISO, etc.
18

Shahnawaz, Shahnawaz. "State of Human Security in Security State: A Case Study of Pakistan." GMPI Conference Series 1 (April 18, 2022): 54–62. http://dx.doi.org/10.53889/gmpics.v1.85.

Texte intégral
Résumé :
Human Security is one of the novel concepts in international relations developed by the United Nations Development Projects (UNDP). The concept of human security revolves around protecting people from illiteracy, diseases, non-development, and food security. It describes how the state is developing and investing in human development and human capabilities. It is significant to note that international relations literature critically focuses on national security and the importance of state security. Most pundits of international relations do not give importance to human security and assert that
Styles APA, Harvard, Vancouver, ISO, etc.
19

Hnatenko, Valeriy. "Economic Security in The State National Security System." Krakowskie Studia Małopolskie 27, no. 3 (2020): 96–105. http://dx.doi.org/10.15804/ksm20200307.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

FEHLER, Włodzimierz. "INTERNAL SECURITY IN AN INTEGRATED STATE SECURITY SYSTEM." National Security Studies 1, no. 1 (2011): 305–26. http://dx.doi.org/10.37055/sbn/129736.

Texte intégral
Résumé :
Artykuł stanowi próbę ukazania miejsca i znaczenia bezpieczeństwa wewnętrznego w systemie bezpieczeństwa państwa. Po przedstawieniu istoty bezpieczeństwa wewnętrznego i polityki bezpieczeństwa wewnętrznego autor na tle istniejących rozwiązań zakreśla kierunki i propozycje działań dotyczące poprawnego i adekwatnego umocowania problematyki bezpieczeństwa wewnętrznego w systemie bezpieczeństwa państwa. Praktyka organizacyjna stanowi w takim systemie jeden z zasadniczych elementów. Możliwości polityczne państwa wskazują natomiast na potencjalną adjustację i ciągłą poprawę bezpieczeństwa państwa.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Rohilie, Haunan Fachry. "STATE SECURITY AND HUMAN SECURITY IN BORDER MANAGEMENT." Jurnal Academia Praja 3, no. 01 (2020): 23–36. http://dx.doi.org/10.36859/jap.v3i01.153.

Texte intégral
Résumé :
This study tries to see how the condition borders region between Indonesia and Malaysia, in Ketungau Hulu subdistrict. Analysis is conducted to see how the borders management in Indonesia with two approaches. The first approach is the analysis of State Security used to see how the treatment of the state to maintain state sovereignty from the external threats that dominated by military. The second approach is the analysis of Human Security which is more emphasis on the security of citizens as seen from the fulfillment of basic human needs, both in terms of welfare, education, health, and so for
Styles APA, Harvard, Vancouver, ISO, etc.
22

Morris, Travis. "Achieving national security: comparing four state security models." Police Practice and Research 13, no. 2 (2012): 121–37. http://dx.doi.org/10.1080/15614263.2011.596689.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Mirshuk, O. Ye. "SOCIAL SECURITY AS A COMPONENT OF STATE SECURITY." Habitus, no. 53 (2023): 15–20. http://dx.doi.org/10.32782/2663-5208.2023.53.2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Mabee, Bryan. "Security Studies and the `Security State': Security Provision in Historical Context." International Relations 17, no. 2 (2003): 135–51. http://dx.doi.org/10.1177/00471178030172002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Blakyta, Ganna, and Tetiana Ganushchak. "Enterprise financial security as a component of the economic security of the state." Investment Management and Financial Innovations 15, no. 2 (2018): 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.

Texte intégral
Résumé :
The article deals with problems of economic and financial security ensuring both in companies and state. The Corruption Perceptions Index has been analyzed as one of the most important indicators in this sphere. The following research methods have been used: generalizing theoretical knowledge, comparison method, method of analysis and synthesis, statistical analysis, factual analysis. The authors give their own definitions to such concepts as “security”, “financial security of the enterprise”, “economic security of the enterprise”. There have been also systemized the threats to the economic se
Styles APA, Harvard, Vancouver, ISO, etc.
26

Varnalii, Zakharii. "Multi-stage structure of state security (the case of economic and financial security)." University Economic Bulletin, no. 54 (September 27, 2022): 87–94. http://dx.doi.org/10.31470/2306-546x-2022-54-87-94.

Texte intégral
Résumé :
Relevance of the research topic. The globalization threats of modernity determine the extreme urgency of the problem of ensuring the national security of any state. A new large-scale challenge for national security of Ukraine was the military aggression of the Russian Federation against Ukraine, a large-scale war that began on February 24, 2022. Under conditions of military aggression, the role and significance of the further development of security are enhanced. Formulation of the problem. Given the relevance and need to deepen the theoretical foundations of security, especially in the contex
Styles APA, Harvard, Vancouver, ISO, etc.
27

Khan, I. U., S. Kateryna, N. D. Nte, and I. A. Sandano. "DEPENDENT STATE SECURITY: RELATIONSHIP BETWEEN THE PAKISTANI TERRORISM THREAT AND CHINESE STATE SECURITY." Trames. Journal of the Humanities and Social Sciences 23, no. 1 (2019): 51. http://dx.doi.org/10.3176/tr.2019.1.05.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Deres, Kornélia. "From State Security to Security State: Performing Control and Claustrophobia in Hungarian Theatre." New Theatre Quarterly 36, no. 4 (2020): 320–31. http://dx.doi.org/10.1017/s0266464x20000627.

Texte intégral
Résumé :
This article examines how the exchanges of archival and artistic practices in Central European and, more precisely, in Hungarian theatre and performance can create performative sites calling attention to the continuities and recurring reflexes of pre- and post-1989 realities. The genre of re-performance allows performance artists to comment on their own experience with the communist regimes, as well as to enact the continuing political and aesthetic potentials of past performances. In 1986, a recently founded performance group, the Collective of Natural Disasters, premiered its piece Living Sp
Styles APA, Harvard, Vancouver, ISO, etc.
29

Anggayudha, Zaihan Harmaen, and Jody Imam Rafsanjani. "State Security Vs Human Security: Which Should Prioritize The State or The Individual?" Operations Research: International Conference Series 4, no. 2 (2023): 45–51. http://dx.doi.org/10.47194/orics.v4i2.226.

Texte intégral
Résumé :
Nowadays, the concept of human security is an issue that is often discussed, especially when issues regarding policies or how a country deals with the Covid-19 pandemic make headlines in every news report. The concept of human security shifts the focus point of security which previously focused on the state to become towards individuals. Often various discussions collide these two concepts under the pretext of finding the best way for the state to make an appropriate policy, especially during emergencies such as problems caused by the Covid-19 Pandemic. So to solve this problem it is necessary
Styles APA, Harvard, Vancouver, ISO, etc.
30

Sergiienko, Larysa, Valentyna Ksendzuk, and Dmytro Zakharov. "Urban State Security: Literature Network Analysis." Society and Security, no. 4(4) (September 30, 2024): 41–54. http://dx.doi.org/10.26642/sas-2024-4(4)-41-54.

Texte intégral
Résumé :
The article provides a comprehensive review of the contemporary landscape of urban state security research and practice. The research used bibliometrics analysis of scientific periodicals from the Web of Science (2000-2022). The scientific papers selected by the keyword “urban state security” were exported for processing in the VOSviewer and R. Based on the results of 4620 publications were accepted. Commencing with a precise definition of urban state security and an exploration of its significance, the paper proceeds to scrutinize the principal threats and challenges faced by urban environmen
Styles APA, Harvard, Vancouver, ISO, etc.
31

Anosike, K., and R. Wilcox. "Exploring Security Issues in Abia State." International Journal of Contemporary Issues and Trends in Research 1, no. 2 (2023): 70–92. https://doi.org/10.5281/zenodo.10277681.

Texte intégral
Résumé :
<strong>Abstract&nbsp;</strong>This study aims at assessing community policing and security in Abia State. Survey method was adopted and simple random sampling was used to select respondents, while the data analysis was done using the chi square technique. The results of the study were presented using tables, frequencies and percentages. The results indicate that the Nigeria Police Force (NPF) have performed poorly in controlling crime in various localities. Also, majority of the respondents (30.8 percent) agreed that Nigeria Police Force are unfriendly to the general public. It was also obser
Styles APA, Harvard, Vancouver, ISO, etc.
32

ZHANG, Hai-Xia, Yi-Feng LIAN, Pu-Rui SU, and Deng-Guo FENG. "Security-State-Region-Based Model of Network Security Evaluation." Journal of Software 20, no. 2 (2009): 451–61. http://dx.doi.org/10.3724/sp.j.1001.2009.00451.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Alizada, Cavid, and Bahtiyar Aliyev. "Cyber security is an integral part of state security." Juridical Sciences and Education 55, no. 55 (2018): 21–37. http://dx.doi.org/10.25108/2304-1730-1749.iolr.2018.55.21-37.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Buur, Lars. "Security beyond the state: private security in international politics." Review of African Political Economy 40, no. 136 (2013): 331–32. http://dx.doi.org/10.1080/03056244.2013.797763.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Razinkova, Mіla. "EXTERNAL DEBT SECURITY IN THE STATE ECONOMIC SECURITY SYSTEM." Actual Problems of Economics 1, no. 247 (2022): 88–94. https://doi.org/10.32752/1993-6788-2022-1-247-88-94.

Texte intégral
Résumé :
The article defines the features of external debt security in the system of economic security of the state. The place of external debt security in the system of national and economic security is defined. The strategies of various countries to ensure economic stability are analyzed. The meaningful characteristics of foreign debt security are determined. Aspects of external debt management are considered.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Berg, J. "Security Beyond the State: Private security in international politics." African Affairs 111, no. 444 (2012): 496–97. http://dx.doi.org/10.1093/afraf/ads035.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Otto, Lisa, and Dries Velthuizen. "The broken relationship between state security and human security." African Security Review 29, no. 3 (2020): 223–24. http://dx.doi.org/10.1080/10246029.2020.1847441.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Baker, Bruce. "Security Beyond the State: Private Security in International Politics." International Peacekeeping 20, no. 1 (2013): 118–19. http://dx.doi.org/10.1080/13533312.2012.761852.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Kees van Donge, Jan. "Security Beyond the State: Private Security and International Politics." Journal of Development Studies 48, no. 4 (2012): 583–84. http://dx.doi.org/10.1080/00220388.2011.558769.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Fitri Maya Padmi, Made. "Nation State as Security Provider in Human Security Issue." Jurnal Hubungan Internasional 4, no. 1 (2015): 97–104. http://dx.doi.org/10.18196/hi.2015.0070.97-104.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

HOOGENSEN GJØRV, GUNHILD. "Security by any other name: negative security, positive security, and a multi-actor security approach." Review of International Studies 38, no. 4 (2012): 835–59. http://dx.doi.org/10.1017/s0260210511000751.

Texte intégral
Résumé :
AbstractThis article examines the challenges and contradictions between some of the leading conceptions of security within the field of International Relations (IR), from those stating that the concept can only be employed by the state with regard to immediate, existential threats, to those that see security as the foundation of social life or as a human good. This article continues a discussion that has taken place in the Review of International Studies regarding the development of positive security, examining the potential use of the terms ‘negative’ and ‘positive’ security to bring clarity
Styles APA, Harvard, Vancouver, ISO, etc.
42

Igor, CHUGUNOV, and NIKITISHIN Andriy. "TAX SECURITY OF THE STATE." Herald of Kyiv National University of Trade and Economics 126, no. 4 (2019): 31–41. http://dx.doi.org/10.31617/visnik.knute.2019(126)03.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Bondarenko, R., and V. Mykhalchuk. "INFORMATION SECURITY OF THE STATE." Investytsiyi: praktyka ta dosvid, no. 5 (March 16, 2021): 95. http://dx.doi.org/10.32702/2306-6814.2021.5.95.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Kurek, Justyna. "National (State) Security – Treaty Determinants." EUROPEAN RESEARCH STUDIES JOURNAL XXV, Issue 2 (2022): 160–71. http://dx.doi.org/10.35808/ersj/2913.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Texte intégral
Résumé :
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and
Styles APA, Harvard, Vancouver, ISO, etc.
46

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Texte intégral
Résumé :
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and
Styles APA, Harvard, Vancouver, ISO, etc.
47

Gorohov, Roman S., and Sergey N. Novikov. "STATE OF CAD INFORMATION SECURITY." Interexpo GEO-Siberia 6, no. 1 (2020): 110–13. http://dx.doi.org/10.33764/2618-981x-2020-6-1-110-113.

Texte intégral
Résumé :
The analysis of the current state of CAD is carried out. The article describes the position of advanced CAD information security equipment. Since any CAD system is a non-standard information system, an individual approach to guarantee its security is required. Special attention is paid to the need for a rational combination of cryptographic and steganographic methods to protect project documentation from unauthorized access. Based on theoretical provisions and practical data, the issues of reliable and secure transmission of project documentation over fiber-optic communication lines are consid
Styles APA, Harvard, Vancouver, ISO, etc.
48

Solar, Carlos. "Non-State Security in Chile." Peace Review 30, no. 2 (2018): 238–45. http://dx.doi.org/10.1080/10402659.2018.1458969.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Smolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.

Texte intégral
Résumé :
Abstract The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented. Furthermore authors proposed their own solutions that may improve the level of security of transmitted information. Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access, modification or destruction. Also some suggestions have been proposed for the mod
Styles APA, Harvard, Vancouver, ISO, etc.
50

Volkova, T. A., N. A. Serebryakova, and C. A. Volkova. "PERSONNEL SECURITY OF THE STATE." Region:systems,economy,management 65, no. 2 (2024): 136–43. http://dx.doi.org/10.22394/1997-4469-2024-65-2-136-143.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!