Gotowa bibliografia na temat „The Concept of Security”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „The Concept of Security”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "The Concept of Security":

1

Shin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality". Journal of International Politics 15, nr 1 (31.03.2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

BALDWIN, DAVID A. "The concept of security". Review of International Studies 23, nr 1 (styczeń 1997): 5–26. http://dx.doi.org/10.1017/s0260210597000053.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sretovic, Dragutin, Miroslav Talijan i Hatidza Berisa. "Modern concept of security". Vojno delo 68, nr 1 (2016): 73–101. http://dx.doi.org/10.5937/vojdelo1601073s.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kostic, Mladen. "The concept of security". Vojno delo 68, nr 7 (2016): 68–84. http://dx.doi.org/10.5937/vojdelo1607068k.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret i Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System". Advances in Cyber-Physical Systems 1, nr 2 (23.02.2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Djurdjevic-Lukic, Svetlana. "Broadening security concept: From "national" to "human security"". Medjunarodni problemi 56, nr 4 (2004): 397–408. http://dx.doi.org/10.2298/medjp0404397d.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
In this paper the author explores advantages and disadvantages of expanding the definition of security from the traditional state-centric and military-oriented focus of security to the broader focus on human security. The author's opinion is that human security indicates important social-economic threats, but that the theory of the concept has not yet been coherently developed. Such a broad concept with so many equally valid dimensions of security lacks mechanisms for the establishment of causal relationship among them, and for prioritisation on policy level. There are no clear answers on key questions: who or what will provide human security under which conditions, and how? The all-inclusiveness of the human security approach reduces its value as a concept both to inform and to legitimise practical policy-making.
7

Enkhsaikhan, J. "Human Security Factor in Mongolia’s National Security Concept". Mongolian Journal of International Affairs, nr 7 (14.04.2014): 26–36. http://dx.doi.org/10.5564/mjia.v0i7.137.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Gasper, Des. "Securing Humanity: Situating ‘Human Security’ as Concept and Discourse". Journal of Human Development 6, nr 2 (lipiec 2005): 221–45. http://dx.doi.org/10.1080/14649880500120558.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Editor, The. "The Concept of National Security". Mongolian Journal of International Affairs, nr 17 (15.08.2013): 118–28. http://dx.doi.org/10.5564/mjia.v0i17.88.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Stepanov, Alexey S. "China’s Concept of Military Security". Russia in Global Affairs 18, nr 2 (2020): 188–216. http://dx.doi.org/10.31278/1810-6374-2020-18-2-188-216.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "The Concept of Security":

1

Dolan, Mark E. "The seamless maritime concept". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDolan.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2005.
Thesis Advisor(s): S. Starr King. Includes bibliographical references (p. 67-69). Also available online.
2

Neville, Karen M. "IS security leveraging the concept of knowledge management". Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS research community is restrained by small-scale technical questions as the social aspects of ISS are ignored resulting in fragmented research across the IS field. While several possible methods are scattered throughout the literature – they focus on the development of information systems. ISS professionals require a range of skills encompassing business knowledge, legal awareness, and organisational processes as well as technical security knowledge. Research to date has failed to provide an integrated approach to managing ISS knowledge. This study investigates how ISS could leverage the concept of knowledge management. It proposes a theoretical model derived from the ISS and KM literatures. Thus to address this gap in research, this study adopts an exploratory interpretive holistic case study approach using interviews and document analysis as data gathering methods. The study will focus on the relationship between ISS and KM and the proposed benefits that an ISS KM initiative would produce. An analysis of the approaches used by these specialised structures in managing knowledge within and across the two case studies facilitated the development of an integrated model. The interplay between the functions provided rich description of the approaches used to manage knowledge. This research builds on previous studies documented in the ISS literature, by providing a much needed model against which practitioners may diagnose problems, plan action and implement solutions. ISS models and standards today do not exhibit much flexibility, therefore managers make ISS decisions in a vacuum. ISS problems can be managed or reduced when the ISS functions and management are aware of the full range of controls available and implement the most effective. Unfortunately, they often lack this knowledge and their subsequent actions to cope with threats are less effective. The focus of ISS research to date has been technical and grounded in positivism and few, if any, studies utilise a qualitative approach, therefore eliminating holistic, in-depth rich descriptions of core issues within the field. Comparatively little work has taken a managerial point of view, covering broad organisational and social issues. This study acknowledges these issues and provides a solid conceptual foundation for future studies on ISS by answering calls for a theoretical model to guide research in the area. The study also identifies the positive and negative impacts of compliance and describes how organisations can apply the model to overcome these negative effects.
3

Schmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.
Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
4

Tigerstrom, Barbara J. von. "The concept of human security : some implications for international law". Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423873.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

May, Elizabeth. "Attachment security, self-concept clarity and beliefs in obsessive-compulsive disorder". Thesis, University of Hertfordshire, 2007. http://hdl.handle.net/2299/853.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Cognitive models of obsessive-compulsive disorder (OCD) suggest that an ambivalent self-concept and dysfunctional beliefs play an important role in the pathogenesis of OCD. Early attachment experience is argued to be the main process through which such ambivalent self-representations develop. The current study investigated self-concept clarity, a broader construct than ambivalence, attachment security, obsessive-compulsive (OC)-relevant beliefs and their relation to OC symptoms. Forty four people who reported experiencing OC symptoms were compared to 34 individuals who reported no mental health difficulties. People who experienced OC symptoms exhibited significantly less self-concept clarity, less attachment security and higher levels of OC-related beliefs. Once levels of depression were controlled for, no significant relationship between attachment security and self-concept clarity was found in the OCD group. OC symptoms were not significantly correlated with self-concept clarity in the OCD group, although significant negative relationships were found between self-concept clarity and specific OC symptoms. Evidence was found to support the notion that OC-relevant beliefs mediate the relationship between self-concept clarity and OC symptoms, in addition to mediating the relationship between attachment anxiety and OC symptoms. Implications for attachment theory and cognitive models of OCD are discussed, along with clinical and research implications.
6

Lack, Lindsey A. "Using the bootstrap concept to build an adaptable and compact subversion artifice". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FLack.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 69-71). Also available online.
7

Morrissey, Joseph Patrick. "The extension and hardware implementation of the comprehensive integrated security system concept". Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditional ones such as disgruntled employees, malicious software, and accidental damage must still be countered. A comprehensive integrated security system ( CISS ) has been developed to provide security within the Open Systems Interconnection (OSI) and Open Distributed Processing (ODP) environments. The research described in this thesis investigates alternative methods for its implementation and its optimisation through partial implementation within hardware and software and the investigation of mechanismsto improve its security. A new deployment strategy for CISS is described where functionality is divided amongst computing platforms of increasing capability within a security domain. Definitions are given of a: local security unit, that provides terminal security; local security servers that serve the local security units and domain management centres that provide security service coordination within a domain. New hardware that provides RSA and DES functionality capable of being connected to Sun microsystems is detailed. The board can be used as a basic building block of CISS, providing fast cryptographic facilities, or in isolation for discrete cryptographic services. Software written for UNIX in C/C++ is described, which provides optimised security mechanisms on computer systems that do not have SBus connectivity. A new identification/authentication mechanism is investigated that can be added to existing systems with the potential for extension into a real time supervision scenario. The mechanism uses keystroke analysis through the application of neural networks and genetic algorithms and has produced very encouraging results. Finally, a new conceptual model for intrusion detection capable of dealing with real time and historical evaluation is discussed, which further enhances the CISS concept.
8

Schmalen, Daniel. "Security Concept for VPN IPsec Site-to-Site Connections to Third Parties". Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:

VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation.

This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key findings for each part. Furthermore, the findings are applied to create a practical, enterprise-close security concept that is both complete and comprehensible.

The security concept may play a significant role in the overall understanding of the given use-case, a VPN IPsec (Internet Protocol Security) Site-to-Site connection to a third-party company, to avoid security leaks in the owner’s network. Furthermore, the VPN itself has to be secured against outsider adversaries such as eavesdroppers.

9

Zacarias, Agostinho M. "The security concept in Southern Africa : prospects for the post-apartheid era". Thesis, London School of Economics and Political Science (University of London), 1996. http://etheses.lse.ac.uk/1426/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
The thesis examines the concept of security that states and other actors in Southern Africa have acted upon. It argues that Southern Africa, due to its peculiar colonial history and apartheid, and the regions' links with great powers, embraced the traditional concept of security, a concept that was unsustainable and inappropriate for its specific conditions. The traditional concept seeks to protect states and domestic societies from outside threats. This concept was inherently militaristic, nationally focused, state-centric and narrow in scope. The emphasis is on immediate problem-solving rather than on a sustained attempt to identify the underlying causes of insecurity. Its application to Southern Africa led to regional confrontation and produced more insecurity than security. Southern Africa needs a new concept which is broader and long term in its outlook in order to restore stability and prosperity. The new concept should essentially be people centred, because people are the only object of security. The new concept should take into account the diverse factors, military and non-military impinging on the security of people. Placing people at the centre, when conceptualising security, requires focusing on making the environment secure rather than on the threats to and the vulnerabilities of the state. The environment of security is defined by the coexistence of three pillars: order, justice and peace. Thus the task of building security in Southern Africa should be orientated towards the strengthening of these pillars. In the final analysis the pillars need to be supported and reinforced by a political process which seeks to promote the good of all members of society as the final goal of all policy. This cannot be achieved without building legitimate states, i.e. states regarded as protectors of their citizens interests and strengthen social agents other than those merely around the state. The task of building a legitimate state and strengthening civil society then become primary steps in the process of building the desired security community in Southern Africa. National integration of different political communities within the states and regional co-operation are essential. This implies strengthening domestic and regional institutions. While domestic institutions are necessary to reduce internal conflicts, regional institutions are essential to allow the predictability of peace in relations among states. The economic and social inequalities between the states and the military asymmetries, will hamper states quick integration, hence the building of the security community. Regional institutions will tend to drain the resources of the relatively richer states, even though there is a strong will to avoid the confrontations of the past. This thesis suggests that a security system, defined as a pattern of relations aimed at assuring the sharing of common values and interests, should be followed in the process of building security in Southern Africa.
10

Ransome, Paul Edward. "An analysis of recent changes in the concept and practice of work". Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "The Concept of Security":

1

Petrovskii, V. F. Soviet security concept. Moscow: Nauka, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Petrovskiĭ, Vladimir Fedorovich. Soviet security concept. Moscow: General Editorial Board for Foreign Publications, Nauka Publishers, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Song, Yimin. On China's concept of security. Geneva: United Nations Instutute for Disarmament Research, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Carter, Ashton B. A new concept of cooperative security. Washington, D.C: Brookings Institute, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rajaretnam, M., Subrat K. Singhdeo i Amitav Acharya. Human security: From concept to practice. Singapore: World Scientific, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

(Netherlands), Adviesraad Internationale Vraagstukken. NATO's new strategic concept. The Hague: Advisory council on international affairs (AIV), 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Jaḥnī, ʻAlī ibn Fāyiz. Terrorism: Concept and reality. Riyadh: Naif Arab Academy for Security Sciences, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ryu, Yongwook. The Asian financial crisis and ASEAN's concept of security. Singapore: S. Rajaratnam School of International Studies, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Dalby, Simon. Contesting an essential concept: Dilemmas in contemporary security discourse. Ottawa: Norman Paterson School of International Affairs, Program in International Security, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Canada. Canadian Armed Forces. Wing, 17. Arctic integrating concept. Ottawa, Ont: Chief of Force Development, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "The Concept of Security":

1

Nemeth, Charles P. "Concept, context, and definition: Security". W Private Security, 27–64. Boca Raton : CRC Press, [2018]: CRC Press, 2017. http://dx.doi.org/10.4324/9781315157191-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hansmann, Uwe, Martin S. Nicklous, Thomas Schäck i Frank Seliger. "The OCF Security Concept". W Smart Card Application Development Using Java, 165–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-98052-7_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Schäfer, Philip Jan. "The Concept of Security". W Human and Water Security in Israel and Jordan, 5–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29299-6_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Lemaitre, Pierre. "A Hungarian Concept of Security". W European Polyphony, 154–67. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-20280-5_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Siddiky, Chowdhury Ishrak Ahmed. "The concept of energy security". W The Geopolitics of Energy in South Asia, 16–34. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003110057-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Gilder, Alexander. "The concept of human security". W Stabilization and Human Security in UN Peace Operations, 42–76. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003131199-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shaw, D. John. "Redefining the Concept of Food Security". W World Food Security, 383–86. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230589780_40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Landrock, Peter. "A New Concept in Protocols: Verifiable Computational Delegation". W Security Protocols, 137–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49135-x_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Landrock, Peter. "A New Concept in Protocols: Verifiable Computational Delegation". W Security Protocols, 146–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49135-x_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Song, Shaoxu, Jian Zhang i Chunping Li. "Concept Chain Based Text Clustering". W Computational Intelligence and Security, 713–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596448_105.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "The Concept of Security":

1

Гумеров, Рустам Раулевич. "FOOD SECURITY: STRUCTURING THE CONCEPT". W Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (Санкт-Петербург, Ноябрь 2020). Crossref, 2020. http://dx.doi.org/10.37539/nb188.2020.13.30.003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Streszczenie:
Продовольственная безопасность - категория, вызывающая устойчивый интерес со стороны научного сообщества и политического истеблишмента. Это понятие является предметом периодических дискуссий, затрагивающих ключевые проблемы социально-экономического развития страны. В статье предпринята попытка структуризации понятия сообразно целям стратегического управления. Food security is a category that generates sustained interest from the scientific community and the political establishment. This concept is the subject of periodic discussions touching upon the key problems of the country's socio-economic development. The article attempts to structure the concept in accordance with the goals of strategic management.
2

Rannenberg, Kai. "Multilateral security a concept and examples for balanced security". W the 2000 workshop. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/366173.366208.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Boryssenko, A. O. "Multispectral very wide-view sensing concept". W SPIE Defense + Security, redaktorzy Igor V. Ternovskiy i Peter Chin. SPIE, 2017. http://dx.doi.org/10.1117/12.2267702.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Dunkelberger, Kirk A. "Semantic search via concept annealing". W Defense and Security Symposium, redaktor Belur V. Dasarathy. SPIE, 2007. http://dx.doi.org/10.1117/12.720039.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bruguier, Florent, Pascal Benoit, Lionel Torres i Lilian Bossuet. "Hardware security: From concept to application". W 2016 11th European Workshop on Microelectronics Education (EWME). IEEE, 2016. http://dx.doi.org/10.1109/ewme.2016.7496483.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Hu Hua. "Valuation of Information security concept methods". W 2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE). IEEE, 2010. http://dx.doi.org/10.1109/cctae.2010.5545260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Perner, Cora, i Corinna Schmitt. "Security Concept for Unoccupied Aerial Systems". W 2020 IEEE/AIAA 39th Digital Avionics Systems Conference (DASC). IEEE, 2020. http://dx.doi.org/10.1109/dasc50938.2020.9256659.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ussath, Martin, Feng Cheng i Christoph Meinel. "Concept for a security investigation framework". W 2015 7th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2015. http://dx.doi.org/10.1109/ntms.2015.7266478.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Turbide, Simon, Linda Marchese, Marc Terroux i Alain Bergeron. "Synthetic aperture ladar concept for infrastructure monitoring". W SPIE Security + Defence, redaktorzy Gary Kamerman, Ove Steinvall, Gary J. Bishop, Ainsley Killey i John D. Gonglewski. SPIE, 2014. http://dx.doi.org/10.1117/12.2067420.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Stamm, Shane, i Pejmun Motaghedi. "Orbital express capture system: concept to reality". W Defense and Security, redaktorzy Peter Tchoryk, Jr. i Melissa Wright. SPIE, 2004. http://dx.doi.org/10.1117/12.544569.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "The Concept of Security":

1

Ackerman, John T. Environmental Security: Evolution of a New Concept in Security Studies. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1999. http://dx.doi.org/10.21236/ada388692.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Fletcher, B. E. Underwater Security Vehicle Proof of Concept Demonstration. Fort Belvoir, VA: Defense Technical Information Center, marzec 1993. http://dx.doi.org/10.21236/ada264713.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Carrio, Miguel A., i Jr. System Engineering Concept Demonstration, Security Study. Volume 7. Fort Belvoir, VA: Defense Technical Information Center, grudzień 1992. http://dx.doi.org/10.21236/ada265473.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Al-Sulaiti, Mohamed. Concept of Security for Gulf States After Gulf War. Fort Belvoir, VA: Defense Technical Information Center, maj 1998. http://dx.doi.org/10.21236/ada346280.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Weeks, Joseph L., L. B. McDonald i Jack Hughes. USAF Security Forces Distributed Mission Training: Evolution of the Design Concept. Fort Belvoir, VA: Defense Technical Information Center, październik 2002. http://dx.doi.org/10.21236/ada408667.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Murray, S. A. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition. Fort Belvoir, VA: Defense Technical Information Center, grudzień 1999. http://dx.doi.org/10.21236/ada373576.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

TRANSPORTATION SYSTEMS CENTER CAMBRIDGE MA. OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38. Fort Belvoir, VA: Defense Technical Information Center, lipiec 1989. http://dx.doi.org/10.21236/ada265284.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Thomas, Kelly J. Security into the 21st Century: NATO's Combined Joint Task Force (CJTF) Concept. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2001. http://dx.doi.org/10.21236/ada394271.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Irvine, Cynthia E. The Reference Monitor Concept as a Unifying Principle in Computer Security Education. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1999. http://dx.doi.org/10.21236/ada423529.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rote, Jeffrey M. More Than Combating Terrorism: The Force Security Concept And The Role Of Intelligence. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1998. http://dx.doi.org/10.21236/ada346262.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Do bibliografii