Works matching DE "MANAGEMENT of security systems"
Results: 34
UK airport operators' liability for corporate manslaughter as a result of terrorism: Will security management systems provide protection for the sector?
- Published in:
- Journal of Airport Management, 2018, v. 12, n. 4, p. 412, doi. 10.69554/gyli4095
- By:
- Publication type:
- Article
Cyberwarfare challenge.
- Published in:
- 2011
- Publication type:
- Editorial
Network Security: As the Worms Turn.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 49
- By:
- Publication type:
- Article
PHI Mapping: Do You Know Where Your Data Is?
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2014, v. 33, n. 2, p. 7
- By:
- Publication type:
- Article
System Error: Complicity with Surveillance in Contemporary Workplace Documentaries.
- Published in:
- Seminar -- A Journal of Germanic Studies, 2016, v. 52, n. 4, p. 465, doi. 10.3138/seminar.52.4.07
- By:
- Publication type:
- Article
Quick Reaction Test: Host-Based Security System.
- Published in:
- ITEA Journal of Test & Evaluation, 2010, v. 31, n. 4, p. 447
- By:
- Publication type:
- Article
History of Cyber Testing and Evaluation--A Voice From the Front Lines.
- Published in:
- ITEA Journal of Test & Evaluation, 2010, v. 31, n. 4, p. 449
- By:
- Publication type:
- Article
МОДЕЛЬ БАГАТОРІВНЕВОЇ СИСТЕМИ ДОСТУПУ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2017, v. 23, n. 2, p. 122, doi. 10.18372/2225-5036.23.11817
- By:
- Publication type:
- Article
THE COORDINATION ROLES OF THE EXECUTIVE AS VARIABLES WHICH OUTLINE THE SECURITY RELATIONS IN REPUBLIC OF MACEDONIA.
- Published in:
- Security Dialogues, 2013, v. 4, n. 1, p. 93
- Publication type:
- Article
Local dynamics of security in Africa: The Central African Republic and private security.
- Published in:
- African Security Review, 2008, v. 17, n. 2, p. 15, doi. 10.1080/10246029.2008.9627468
- By:
- Publication type:
- Article
Alerting a Campus Community: Emergency Notification from a Public's Perspective.
- Published in:
- Journal of Contingencies & Crisis Management, 2015, v. 23, n. 4, p. 184, doi. 10.1111/1468-5973.12074
- By:
- Publication type:
- Article
Where Is the Organization Looking in Order to Be Proactive about Safety? A Framework for Revealing whether It Is Mostly Looking Back, Also Looking Forward or Simply Looking Away.
- Published in:
- Journal of Contingencies & Crisis Management, 2015, v. 23, n. 2, p. 97, doi. 10.1111/1468-5973.12079
- By:
- Publication type:
- Article
Applications in intelligent systems of knowledge discovery methods based on human–machine interaction.
- Published in:
- International Journal of Intelligent Systems, 2008, v. 23, n. 5, p. 588, doi. 10.1002/int.20285
- By:
- Publication type:
- Article
Building the capacity of police change agents: The nexus policing project.
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 72, doi. 10.1080/10439460701718583
- By:
- Publication type:
- Article
The role of the rank and file in police reform.
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 1, doi. 10.1080/10439460701718484
- By:
- Publication type:
- Article
Police reform: Who done it?
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 7, doi. 10.1080/10439460701718518
- By:
- Publication type:
- Article
Why reforms fail.
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 23, doi. 10.1080/10439460701718534
- By:
- Publication type:
- Article
Enduring issues of police culture and demographics.
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 35, doi. 10.1080/10439460701718542
- By:
- Publication type:
- Article
Research for the front lines.
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 46, doi. 10.1080/10439460701718567
- By:
- Publication type:
- Article
Police officers as change agents in police reform.
- Published in:
- Policing & Society, 2008, v. 18, n. 1, p. 60, doi. 10.1080/10439460701718575
- By:
- Publication type:
- Article
Security for Web Services: Standards and Research Issues.
- Published in:
- International Journal of Web Services Research, 2009, v. 6, n. 4, p. 48, doi. 10.4018/jwsr.2009071303
- By:
- Publication type:
- Article
Reliability determination of ignition system of rocket platform using reliability block diagram and FMEA analysis.
- Published in:
- Vibroengineering Procedia, 2015, v. 6, p. 115
- By:
- Publication type:
- Article
Goodnight Mao: To the monitors of China's "Great Firewall," even storybook characters can be subversive.
- Published in:
- Hoover Digest: Research & Opinion on Public Policy, 2018, n. 3, p. 115
- By:
- Publication type:
- Article
Developing a Security Culture.
- Published in:
- Journal: American Water Works Association, 2012, v. 104, n. 6, p. 28, doi. 10.5942/jawwa.2012.104.0097
- By:
- Publication type:
- Article
A Survey of Visual Sensor Networks.
- Published in:
- Advances in Multimedia, 2009, v. 2009, p. 1, doi. 10.1155/2009/640386
- By:
- Publication type:
- Article
Chasing a Definition of “Alarm”.
- Published in:
- Journal of Network & Systems Management, 2009, v. 17, n. 4, p. 457, doi. 10.1007/s10922-009-9127-3
- By:
- Publication type:
- Article
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 4, p. 920, doi. 10.3390/s17040920
- By:
- Publication type:
- Article
GaAs Coupled Micro Resonators with Enhanced Sensitive Mass Detection.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 12, p. 22785, doi. 10.3390/s141222785
- By:
- Publication type:
- Article
Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2016, v. 14, n. 2, p. 89, doi. 10.6109/jicce.2016.14.2.089
- By:
- Publication type:
- Article
Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research.
- Published in:
- Forum: Qualitative Social Research / Qualitative Sozialforschung, 2016, v. 17, n. 1, p. 215
- By:
- Publication type:
- Article
On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. 883, doi. 10.1109/TDSC.2010.55
- By:
- Publication type:
- Article
DIGITALLY SECURE TRANSFORMATION.
- Published in:
- ITNOW, 2017, v. 59, n. 2, p. 12, doi. 10.1093/itnow/bwx036
- By:
- Publication type:
- Article
Hyperspectral imaging: future applications in security systems.
- Published in:
- Advanced Optical Technologies, 2017, v. 6, n. 2, p. 61, doi. 10.1515/aot-2017-0007
- By:
- Publication type:
- Article
An integrated system for information security management with the unified framework.
- Published in:
- Journal of Risk Research, 2016, v. 19, n. 1, p. 21, doi. 10.1080/13669877.2014.940593
- By:
- Publication type:
- Article