Results 11 to 20 of about 1,926,489 (304)

The role of the private security in the critical infrastructure protection in some of the Balkan states [PDF]

open access: yesBezbednosni Dijalozi, 2017
The paper focuses on the aspect of critical infrastructure protection by the private security segment, which has an increasingly significant role in the provision of security. The critical infrastructure system is interconnected and cannot be perceived
Leta Bardzieva
doaj   +1 more source

The protection of Business Secrets and Personal Data in Private Safety [PDF]

open access: yesBezbednosni Dijalozi, 2015
It is well known that sources that threaten the data privacy of economic subjects through human interference, no matter if it is accidental or on purpose, could be divided into inner, outer, and combined sources.
Milan Daničić, Milan Milosevic
doaj   +1 more source

The Development of Private Security and the Dilemmas Surrounding the Effects of Private Security Services [PDF]

open access: yesBezbednosni Dijalozi, 2016
Despite the fact that private security services are not a new phenomenon, the increasing trend in the development of private security is linked to the 1990s when the number of private security service providers saw a manifold increase.
Zorica Saltirovska
doaj   +1 more source

Specific aspects of private security in high-risk zone [PDF]

open access: yesВојно дело, 2015
Rapid commercialization of security services in high-risk zones and engaging security and private military companies has put private security in high-risk zones in the focus of interest.
Srdanović Srđan
doaj   +1 more source

Fusarium Fungi Pathogens, Identification, Adverse Effects, Disease Management, and Global Food Security: A Review of the Latest Research

open access: yesAgriculture, 2023
Fusarium pathogens are ubiquitous and mainly associated with diseases in plants. They are the subject of great economic concern in agriculture due to crop losses to contamination of cereal grains with mycotoxins.
Theodora Ijeoma Ekwomadu, Mulunda Mwanza
doaj   +1 more source

Dataset of shotgun metagenomic evaluation of lettuce (Lactuta sativa L.) rhizosphere microbiome

open access: yesData in Brief, 2023
Lettuce (Lactuca sativa L.) is an important vegetable grown and consumed across the world, including South Africa and its rhizosphere constitutes a dynamic community of root associated microbes.
Olubukola Oluranti Babalola   +2 more
doaj   +1 more source

Communication between Plants and Rhizosphere Microbiome: Exploring the Root Microbiome for Sustainable Agriculture

open access: yesMicroorganisms, 2023
Plant roots host numerous microorganisms around and inside their roots, forming a community known as the root microbiome. An increasing bulk of research is underlining the influences root-associated microbial communities can have on plant health and ...
Ben Jesuorsemwen Enagbonma   +3 more
doaj   +1 more source

Private security preparedness for disasters caused by fire [PDF]

open access: yesNBP: Nauka, bezbednost, policija, 2021
The subject of the research was the examination of the factors of influence on the preparedness of the private security for disasters caused by fire. In addition to determining the preparedness index, there are deeper insights into the interrelationships
Cvetković Vladimir   +2 more
doaj   +1 more source

Territorial Tactics: The Socio-spatial Significance of Private Policing Strategies in Cape Town [PDF]

open access: yes, 2014
This paper analyses the policing strategies of private security companies operating in urban space. An existing literature has considered the variety of ways that territory becomes of fundamental importance in the work of public police forces.
Brewer J.   +16 more
core   +2 more sources

Usable, Secure, Private Search [PDF]

open access: yesIEEE Security & Privacy, 2012
Real-world applications commonly require untrusting parties to share sensitive information securely. This article describes a secure anonymous database search (SADS) system that provides exact keyword match capability. Using a new reroutable encryption and the ideas of Bloom filters and deterministic encryption, SADS lets multiple parties efficiently ...
Raykova, Mariana Petrova   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy