Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Security.

Artykuły w czasopismach na temat „Security”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Pollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.

Pełny tekst źródła
Streszczenie:
Part I of this Note addresses the restrictions on intelligence gathering under FISA prior to 9/11 and the motivations underlying the Patriot Act's revisions to FISA. Part II discusses the problems with the "primary purpose" test, which was in effect prior to the Patriot Act's revisions to FISA. Part III reviews the various policy and constitutional arguments made against the Patriot Act's "significant purpose" test. Part IV proposes that Congress enact a new "inextricably intertwined" test to govern the admission of FISA material in criminal prosecutions. Specifically, this Part looks at sixty
Style APA, Harvard, Vancouver, ISO itp.
4

Al-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Pełny tekst źródła
Streszczenie:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protectio
Style APA, Harvard, Vancouver, ISO itp.
6

Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Molloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Economides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Muhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.

Pełny tekst źródła
Streszczenie:
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure. This article explores the various methods that organizations can use to secure their network infrastructure and maintain the integrity of their sensitive information. This article provides valuable insights into the various methods that organizations can use to secure their network infrastructure
Style APA, Harvard, Vancouver, ISO itp.
12

Muhammad, Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. https://doi.org/10.5281/zenodo.8109753.

Pełny tekst źródła
Streszczenie:
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure. This article explores the various methods that organizations can use to secure their network infrastructure and maintain the integrity of their sensitive information. This article provides valuable insights into the various methods that organizations can use to secure their network infrastruc
Style APA, Harvard, Vancouver, ISO itp.
13

TOMÁŠEK, Martin. "Security Properties Verification of Security Protocols." Acta Electrotechnica et Informatica 14, no. 2 (2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Pełny tekst źródła
Streszczenie:
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article
Style APA, Harvard, Vancouver, ISO itp.
15

Dynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.

Pełny tekst źródła
Streszczenie:
In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opp
Style APA, Harvard, Vancouver, ISO itp.
16

WEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Pełny tekst źródła
Streszczenie:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to
Style APA, Harvard, Vancouver, ISO itp.
17

Neamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Kharb, Latika, and Deepak Chahal. "Cloud Access Security Brokers: Strengthening Cloud Security." International Journal of Research Publication and Reviews 4, no. 8 (2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.

Pełny tekst źródła
Streszczenie:
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
Style APA, Harvard, Vancouver, ISO itp.
20

Clough, Patricia Ticineto, and Craig Willse. "Gendered Security/National Security." Social Text 28, no. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Elliott, Lorraine. "Human security/environmental security." Contemporary Politics 21, no. 1 (2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Pasquinucci, Andrea. "Defeating security with security." Computer Fraud & Security 2008, no. 2 (2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Keeley, James F. "Review: Security: Writing Security." International Journal: Canada's Journal of Global Policy Analysis 48, no. 3 (1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Srinivas, Adilapuram. "Unveiling Modern Authentication Strategies for Java APIs: Exploring OAuth 2.0, JWT, API Keys, and Basic Authentication." Journal of Scientific and Engineering Research 9, no. 9 (2022): 119–25. https://doi.org/10.5281/zenodo.14631323.

Pełny tekst źródła
Streszczenie:
Authentication mechanisms are essential for securing Java APIs. They safeguard sensitive data and restrict unauthorized access. OAuth 2.0 provides a comprehensive framework that allows third-party providers to manage authentication. It simplifies user experience while enhancing security. JWT offers a stateless and compact way to share data securely. However, its implementation demands careful consideration to prevent token misuse. API keys are simple but prone to security risks if mismanaged. Basic authentication, despite its simplicity, lacks strength due to plain-text credentials. Selecting
Style APA, Harvard, Vancouver, ISO itp.
25

Chiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.

Pełny tekst źródła
Streszczenie:
Decentralized solutions, widely adopted across industries like banking, health- care, and logistics, face persistent security concerns from potential threats. This study introduces a novel decentralized vulnerability assessment using GPT-3, an artificial intelligence (AI) technology. Employing Dockerized containers for disinfecting environments and creating unique connections to the AI API service enhances system responsiveness. AI algorithms, specifically GPT-3, conduct comprehensive network scans to identify security flaws. Findings are securely distributed to network nodes, fortifying the s
Style APA, Harvard, Vancouver, ISO itp.
26

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Pełny tekst źródła
Streszczenie:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 6
Style APA, Harvard, Vancouver, ISO itp.
27

Othman, Sadeq. "Securing Robotic Communication using Multiple Security Techniques." International Journal of Computer Applications 178, no. 1 (2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Antonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Romero Ortiz, María Elena, and Carlos Uscanga Prieto. "Japan: Securing Cooperation or Cooperating to Security?" México y la Cuenca del Pacífico 5, no. 14 (2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Singh, Ritesh, Lalit Kumar, Debraj Banik, and S. Sundar. "Smart security and securing data through watermarking." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Sri, Harsha Vardhan Sanne. "Securing the Helm: Navigating Container Security in Kubernetes." European Journal of Advances in Engineering and Technology 9, no. 3 (2022): 167–71. https://doi.org/10.5281/zenodo.11906265.

Pełny tekst źródła
Streszczenie:
As Kubernetes continues to dominate the container orchestration landscape, the security of its deployments, particularly through Helm, has become a paramount concern. This review paper explores the multifaceted security challenges inherent in Kubernetes environments, with a specific focus on Helm, a popular package manager that simplifies the deployment and management of Kubernetes applications. By dissecting the primary security vulnerabilities related to container orchestration, such as isolation flaws, misconfigurations, and network security complexities, this paper provides a comprehensive
Style APA, Harvard, Vancouver, ISO itp.
32

Shin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Rushton, Simon. "Global Health Security: Security for whom? Security from what?" Political Studies 59, no. 4 (2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.

Pełny tekst źródła
Streszczenie:
The concept of ‘health security’ has been increasingly apparent in recent years in both academic and policy discourses on transborder infectious disease threats. Yet it has been noted that there are a range of conceptualisations of ‘health security’ in circulation and that confusion over the concept is creating international tensions with some states (particularly from the Global South) fearing that ‘health security’ in reality means securing the West. This article examines these tensions but puts forward an alternative explanation for them. It begins by looking at the different ‘health securi
Style APA, Harvard, Vancouver, ISO itp.
34

Metodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.

Pełny tekst źródła
Streszczenie:
A new element has been added to the components of corporate security - migration security. The proposed new author's terms for our scientific community - "migration security" will facilitate future research in the field of the impact of migration processes on the security of regions and business organizations.
Style APA, Harvard, Vancouver, ISO itp.
35

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Pełny tekst źródła
Streszczenie:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most
Style APA, Harvard, Vancouver, ISO itp.
36

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.

Pełny tekst źródła
Streszczenie:
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
Style APA, Harvard, Vancouver, ISO itp.
37

Kyung-Im Cho. "Security Deposit as Collateral Security." Korean Lawyers Association Journal 64, no. 12 (2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

HOFREITER, Ladislav. "SECURITY CULTURE AND SECURITY MANAGEMENT." Krízový Manažment 14, no. 2 (2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

INTRILIGATOR, MICHAEL D. "GLOBAL SECURITY AND HUMAN SECURITY." International Journal of Development and Conflict 01, no. 01 (2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Johansen, Robert C. "Real Security is Democratic Security." Alternatives: Global, Local, Political 16, no. 2 (1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Malcolmson, Robert W. "Review: International Security: Alternative Security." International Journal: Canada's Journal of Global Policy Analysis 46, no. 4 (1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Cohen, Fred. "Strategic Security Intelligence — Embedded Security." Network Security 2002, no. 2 (2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Leach, Dr John. "Security engineering and security RoI." Computers & Security 22, no. 6 (2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

SØRENSEN, GEORG. "Individual Security and National Security." Security Dialogue 27, no. 4 (1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Trzciński, Łukasz, and Juliusz Piwowarski. "Security culture and security anthropology." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, no. 33 (2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.

Pełny tekst źródła
Streszczenie:
The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that i
Style APA, Harvard, Vancouver, ISO itp.
47

Stosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Fekete, Liz. "Peoples' Security Versus National Security." Race & Class 44, no. 3 (2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Perlmutter, Amos, and Benjamin Frankel. "SECURITY STUDIES and Security Studies." Security Studies 1, no. 1 (1991): iv. http://dx.doi.org/10.1080/09636419109347452.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Soneji, Samir, and Gary King. "Statistical Security for Social Security." Demography 49, no. 3 (2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!