Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Security")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 23075

  • Page / 923
Export

Selection :

  • and

The birth of biometric security = La naissance de la sécurité biométriqueMAGUIRE, Mark.Anthropology today. 2009, Vol 25, Num 2, pp 9-14, issn 0268-540X, 6 p.Article

Resisting the advance of the security state: The impact of frameworks of resistance on the UK'S securitisation agendaPANTAZIS, Christina; PEMBERTON, Simon.International journal of law, crime and justice (Print). 2013, Vol 41, Num 4, pp 358-374, issn 1756-0616, 17 p.Article

Controlling the flow : Security, exclusivity, and criminal intelligence in Ontario = Contrôler les flux : La sécurité, l'exclusivité et le renseignement criminel en OntarioDE LINT, Willem; O'CONNOR, Daniel; COTTER, Ryan et al.International journal of the sociology of law (Print). 2007, Vol 35, Num 1, pp 41-58, issn 0194-6595, 18 p.Article

Ministres de la Défense : l'expérience des autresCHARILLON, Frédéric.Les Champs de Mars. 2007, Num 18, issn 1253-1871, 175 p.Serial Issue

Security-related behavior in using information systems in the workplace: A review and synthesisGUO, Ken H.Computers & security. 2013, Vol 32, pp 242-251, issn 0167-4048, 10 p.Article

UMA ANÁLISE DA HIGIENE E SEGURANÇA DA CRECHE ARCOÍRIS A BUSCA POR UMA BOA QUALIDADE DE VIDA = An analysis of hygiene and security of child care house arco-iris-the find by a quality better of lifeSILVA, Ivanilsa De Oliveira; SANTIAGO BARRETO, Maria Emilia; FERREIRA DE OLIVEIRA, Miriam et al.Revista Universidade Rural. Série ciências humanas. 2004, Vol 26, Num 1-2, pp 78-81, issn 0104-9259, 4 p.Article

Contrat de travail et sécurité des parcours sur le marché du travail = Employment contract and security of career path in the labour marketBRUYERE, Mireille; LIZE, Laurence.Economies et sociétés (Paris). 2012, Vol 46, Num 6, pp 1129-1155, issn 0013-0567, 27 p.Article

Secrecy and National Security WhistleblowingELLSBERG, Daniel.Social research. 2010, Vol 77, Num 3, pp 773-804, issn 0037-783X, 32 p.Article

L'EXTENSION DES FICHIERS DE SÉCURITÉ PUBLIQUE : Traçabilité et réseaux = The Growth of Police RecordsPIAZZA, Pierre.Hermès (Paris. 1988). 2009, Num 53, issn 0767-9513, 69-74, 231 [7 p.]Article

Security, Profiling and EqualityBOU-HABIB, Paul.Ethical theory and moral practice. 2008, Vol 11, Num 2, pp 149-164, issn 1386-2820, 16 p.Article

La gouvernance sécuritaire dans les stations de sports d'hiver françaises = Safety policies in French winter sports resortsCOMELOUP, Jean; SOULE, Bastien.Espaces et sociétés. 2007, Num 128-129, issn 0014-0481, 135-150, 253-254, 258-259, 263-264 [22 p.]Article

Energy security and co-benefits of energy efficiency improvement in three Asian countriesSELVAKKUMARAN, Sujeetha; LIMMEECHOKCHAI, Bundit.Renewable & sustainable energy review. 2013, Vol 20, pp 491-503, issn 1364-0321, 13 p.Article

Factors influencing information security management in small- and medium-sized enterprises: A case study from TurkeyYILDIRIM, Ebru Yeniman; AKALP, Gizem; AYTAC, Serpil et al.International journal of information management. 2011, Vol 31, Num 4, pp 360-365, issn 0268-4012, 6 p.Article

Assisting Social Security Disability Insurance Beneficiaries With Schizophrenia, Bipolar Disorder, or Major Depression in Returning to WorkDRAKE, Robert E; FREY, William; BOND, Gary R et al.The American journal of psychiatry. 2013, Vol 170, Num 12, pp 1433-1441, issn 0002-953X, 9 p.Article

Provably secure non-interactive key distribution based on pairingsDUPONT, Régis; ENGE, Andreas.Discrete applied mathematics. 2006, Vol 154, Num 2, pp 270-276, issn 0166-218X, 7 p.Conference Paper

Social Security: Strengthen Not DismantleSEIPEL, Michael M. O.Journal of sociology and social welfare. 2013, Vol 40, Num 3, pp 69-84, issn 0191-5096, 16 p.Article

Canadian Muslims, Islamophobia and national securityHANNIMAN, Wayne.International journal of law, crime and justice (Print). 2008, Vol 36, Num 4, pp 271-285, issn 1756-0616, 15 p.Article

Distributed temporal logic for the analysis of security protocol modelsBASIN, David; CALEIRO, Carlos; RAMOS, Jaime et al.Theoretical computer science. 2011, Vol 412, Num 31, pp 4007-4043, issn 0304-3975, 37 p.Article

Climate protection and China's energy security: Win-win or tradeoffGANG WU; LIU, Lan-Cui; HAN, Zhi-Yong et al.Applied energy. 2012, Vol 97, pp 157-163, issn 0306-2619, 7 p.Conference Paper

China's energy security: The perspective of energy usersMALAVIKA JAIN BAMBAWALE; SOVACOOL, Benjamin K.Applied energy. 2011, Vol 88, Num 5, pp 1949-1956, issn 0306-2619, 8 p.Article

India's energy security: A sample of business, government, civil society, and university perspectivesJAIN BAMBAWALE, Malavika; SOVACOOL, Benjamin K.Energy policy. 2011, Vol 39, Num 3, pp 1254-1264, issn 0301-4215, 11 p.Article

The concept of energy security: Beyond the four AsCHERP, Aleh; JEWELL, Jessica.Energy policy. 2014, Vol 75, pp 415-421, issn 0301-4215, 7 p.Article

A situation awareness model for information security risk managementWEBB, Jeb; AHMAD, Atif; MAYNARD, Sean B et al.Computers & security. 2014, Vol 44, pp 1-15, issn 0167-4048, 15 p.Article

Nature and future of IT-security regulationRATAI, Balazs.International journal of technology transfer and commercialisation. 2007, Vol 6, Num 1, pp 64-75, issn 1470-6075, 12 p.Article

Information security management standards: Problems and solutionsSIPONEN, Mikko; WILLISON, Robert.Information & management. 2009, Vol 46, Num 5, pp 267-270, issn 0378-7206, 4 p.Article

  • Page / 923