Limit search to available items
Nearby Subjects are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
China -- development -- trade -- security -- regional cooperation -- regional security -- Myanmar -- Belarus -- Uzbekistan. : Security and economy on The Belt and Road : three country case studies / Henrik Hallgren and Richard Ghiasy  2017 1
Security classification (Government documents)   23
Security classification (Government documents) -- Australia.   4
Security classification (Government documents) -- Germany : 60 minutes. Hitler's lake. Part one / produced by Bill Owens  2002 1
Security classification (Government documents) -- United States   17
Security classification (Government documents) -- United States -- Case studies. : A culture of secrecy : the government versus the people's right to know / edited by Athan G. Theoharis  1998 1
Security classification (Government documents) -- United States -- Evaluation : Secrecy in U.S. national security : why a paradigm shift is needed / James B. Bruce, Sina Beaghley, W. George Jameson  2018 1
Security classification (Government documents) -- United States -- History -- 20th century : Secrecy : the American experience / Daniel Patrick Moynihan ; introduction by Richard Gid Powers  1998 1
Security classification (Government documents) -- United States -- Management   2
Security classification (Government documents) -- United States -- Periodicals : Annual report to the President  1989 1
Security clearances.   16
Security clearances -- Australia.   2
Security clearances -- Law and legislation. : Why shoes on the belt? / produced by United States Transportation Security Administration  2009 1
Security clearances -- United States.   16
Security clearances -- United States -- Cases : Case studies in personnel security / collected under the direction of Adam Yarmolinsky  1955 1
Security clearances -- United States -- Evaluation : The Washington Navy Yard shootings : internal and independent reviews / Stanley R. Wallace, editor  2014 1
climate -- security -- international organizations -- EU -- OSCE -- NATO -- Europe. : European regional organizations and climate-related security risks : EU, OSCE and NATO / Niklas Bremberg  2018 1
climate -- security -- international organizations -- R&D -- risk assessment. : IGOs and global climate security challenges : implications for academic research and policymaking / Lisa M. Dellmuth, Maria-Therese Gustafsson, Niklas Bremberg and Malin Mobjörk  2017 1
Colombia -- security -- internal politics -- development. : Back from the brink evaluating progress in Colombia, 1999-2007 : a report of the Americas Program Center for Strategic and International Studies / Authors: Peter Deshazo, Tanya Primiani, Phillip McLean  2007 1
 

Security companies, Private -- See Private security services


Here are entered works on organizations outside the public sector that provide systems, services, and staff for the protection of persons and property
  1
 

Security, Computer -- See Computer Security


Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
  1
Computer networks -- security : Network security : PRIVATE communication in a PUBLIC world / Charlie Kaufman, Radia Perlman and Mike Speciner  2002 1
COMPUTER -- Security -- Online Safety & Privacy. : Data Privacy : foundations, new developments and the big data challenge / Vicenc̦ Torra  2017 1
Computers -- Security : Network Security  2014 1
COMPUTERS -- Security -- Cryptography.   136
COMPUTERS -- Security -- Cryptography & Encryption.   5
Computers -- Security -- General.   1745
COMPUTERS -- Internet -- Security.   760
COMPUTERS -- Security -- Network Security.   5
COMPUTERS -- Networking -- Security.   911
COMPUTERS -- Security -- Online Safety & Privacy.   41
COMPUTERS S -- Security -- Networking. : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström  2012 1
COMPUTERS S -- Security -- Online Safety & Privacy. : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström  2012 1
COMPUTERS -- Security -- Viruses.   20
COMPUTERS -- Security -- Viruses & Malware.   18
Conflict of laws -- Security   4
Conflict of laws -- Security -- European Union countries   3
Congo-Kinshasa -- defence -- security. : Supporting SSR in the DRC between a rock and a hard place : an analysis of the donor approach to supporting security sector reform in the Democratic Republic of Congo / Henri Boshoff ..  2010 1
 

Security consultants -- See Also Private security services


Here are entered works on organizations outside the public sector that provide systems, services, and staff for the protection of persons and property
  1
Security consultants.   9
Security consultants -- Australia.   2
Security consultants -- Canada. : Powers of private security personnel : search and seizure : a study paper / prepared for the Law Reform Commission of Canada ; by Philip C. Stenning and Clifford D. Shearing  1979 1
Security consultants -- Handbooks, manuals, etc   3
Security consultants -- Law and legislation -- Canada. : Powers of private security personnel : search and seizure : a study paper / prepared for the Law Reform Commission of Canada ; by Philip C. Stenning and Clifford D. Shearing  1979 1
Security consultants -- Legal status, laws, etc. : From the files of a security expert witness / Charles A. Sennewald  2013 1
Security consultants -- Legal status, laws, etc. -- United States : From the files of a security expert witness / Charles A. Sennewald  2013 1
Security consultants -- Periodicals : Security (Newton, Mass. )  1986- 1
Security consultants -- South Africa : Managing security information : incidents, threats and vulnerabilities : a practical approach for security practitioners serving private and government entities in South Africa / Doraval Govender  2018 1
Computer networks -- Security control. : Windows Server 2003 networking recipes / Robbie Allen, Laura E. Hunter, and Bradley J. Dinerman  2006 1
security cooperation. : EU-Japan Security Cooperation : Trends and Prospects / Emil J. Kirchner, Han Dorussen  2018 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next