Search Results - "securities"
Suggested Topics within your search.
Suggested Topics within your search.
- International relations 362
- Politics & government 321
- Warfare & defence 223
- Research & information: general 142
- History of engineering & technology 116
- Artificial intelligence 111
- Computer security 109
- Technology: general issues 109
- Political science & theory 104
- Sociology 101
- Computer science 87
- Political control & freedoms 86
- Military history 80
- Central government policies 79
- Biology, life sciences 77
- Software Engineering 75
- Terrorism, armed struggle 75
- Computer networking & communications 72
- European history 70
- Development economics & emerging economies 69
- Human rights 68
- Law 67
- Development studies 66
- Crime & criminology 63
- Sustainability 62
- Peace studies & conflict resolution 61
- Diplomacy 60
- Economics 60
- Human geography 57
- Police & security services 57
-
101
Greenland in Arctic Security (De)securitization Dynamics under Climatic Thaw and Geopolitical Freeze
Published 2024Subjects: “…Greenland, security, hard security, soft security, borders, security policies, securitization, desecuritization, climate change, geopolitics, Arctic, Greenland identity, security dynamics, territorial borders, arctic security, identity politics, postcolonialism, great power competition…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
102
Security. Cooperation. Governance. The Canada-United States Open Border Paradox
Published 2023Subjects: “…border, security, interdependence, policy, Canada, United States, North America, states, provinces, globalization, cross-border, coordination, cooperation, collaboration, regulation, trade, regime, technology, migration, region, sector, scale, economy, maritime, intermodal, Great Lakes, Cascadia, Maritimes, Prairies, Midwest, Atlantic, Pacific, automotive, commodity, agriculture, food, bilateral, binational, multilevel governance, federalism, federation, federal system, open border, national security, terrorism, critical infrastructure, drugs, human security, public safety, homeland security, human smuggling, organized crime, food safety, cyber, sabotage, environment, British Columbia, Alberta, Saskatchewan, Manitoba, Ontario, Quebec, New Brunswick, Nova Scotia, Michigan, New York, Washington…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
103
EIB Working Paper 2021/09 - Market finance as a spare tyre? Corporate investment and access to bank credit in Europe
Published 2021Subjects: “…Investment & securities bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
104
Investment Report 2021/2022 - Key Findings Recovery as a springboard for change
Published 2022Subjects: “…Investment & securities bicssc…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
105
EIB Investment Report 2021/2022 Recovery as a springboard for change
Published 2022Subjects: “…Investment & securities bicssc…”
DOAB: description of the publication
Electronic Book Chapter -
106
EIB Working Paper 2021/09 - Market finance as a spare tyre? Corporate investment and access to bank credit in Europe
Published 2021Subjects: “…Investment & securities bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
107
Investment Report 2021/2022 - Key Findings Recovery as a springboard for change
Published 2022Subjects: “…Investment & securities bicssc…”
OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
108
EIB Investment Report 2021/2022 Recovery as a springboard for change
Published 2022Subjects: “…Investment & securities bicssc…”
OAPEN Library: description of the publication
Electronic Book Chapter -
109
-
110
-
111
-
112
Managing Risk and Information Security Protect to Enable /
Published 2013Subjects: “…Data and Information Security.…”
Link to Metadata
Electronic eBook -
113
Building the Infrastructure for Cloud Security A Solutions View /
Published 2014Subjects: “…Data and Information Security.…”
Link to Metadata
Electronic eBook -
114
Managing Risk and Information Security Protect to Enable /
Published 2016Table of Contents: “…Chapter 1 Introduction -- Chapter 2 Misperception of Risk -- Chapter 3 Governance and Internal Partnerships -- Chapter 4 External Partnerships -- Chapter 5 People Are the Perimeter -- Chapter 6 Emerging Capabilities and Usage Models -- Chapter 7 A New Security Architecture to Improve Business Agility -- Chapter 8 Looking to the Future -- Chapter 9 Corporate Social Responsibility -- Chapter 10 The 21st Century CISO -- Chapter 11 Performance Coaching -- Appendix A: References. .…”
Link to Metadata
Electronic eBook -
115
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment /
Published 2020Table of Contents: “…Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements.…”
Link to Metadata
Electronic eBook -
116
Security of Ubiquitous Computing Systems Selected Topics /
Published 2021Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Electronic eBook -
117
Security in Computer and Information Sciences Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers /
Published 2022Table of Contents: “…Enabling 2nd-factor Authentication under Real-world constraints -- Energy, QoS and Security Aware Services at the Edge -- Mitigating the Massive Access Problem in the IoT.…”
Link to Metadata
Electronic eBook -
118
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers /
Published 2018Table of Contents: “…Security of distributed interconnected systems -- Security of software systems -- Security of the Internet of Things.…”
Link to Metadata
Electronic eBook -
119
The EU-China Security Paradox Cooperation Against All Odds?
Published 2023DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
120
Chapter Trust and security in Italy
Published 2023Subjects: “…Security…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter