Results 141 to 150 of about 3,109,144 (196)
Understanding Food and Nutrition Insecurity Among College Students: Evidence from a Cross-Campus Study. [PDF]
Niroula K +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Rise of the Security State
SSRN Electronic Journal, 2013Over the past two decades, the Chinese domestic security apparatus has expanded dramatically. “Stability maintenance” operations have become a priority for local Chinese authorities. We argue that the birth of these trends dates to the early 1990s, when central Party authorities adopted new governance models that differed dramatically from those that ...
Yuhua Wang, Carl F. Minzner
openaire +1 more source
IEEE Security and Privacy Magazine, 2005
The information security train has been running at 100 miles per hour for a few years now - unfortunately, though, we're going in reverse. The security market first focused on the perimeter, firewalls, and antivirus technologies, determined to keep the bad stuff from entering the infrastructure, only to then consider the network, with the logical ...
openaire +1 more source
The information security train has been running at 100 miles per hour for a few years now - unfortunately, though, we're going in reverse. The security market first focused on the perimeter, firewalls, and antivirus technologies, determined to keep the bad stuff from entering the infrastructure, only to then consider the network, with the logical ...
openaire +1 more source
2020
In today’s world of devices, smart phones, tablets, and wearable devices, are widely used for communication, photography, entertainment, monitoring health status, and many more applications. Applications installed in the smartphones provide useful services, but they may maliciously send sensitive information to a remote location for various purposes ...
Saurabh Kumar, Sandeep Kumar Shukla
openaire +1 more source
In today’s world of devices, smart phones, tablets, and wearable devices, are widely used for communication, photography, entertainment, monitoring health status, and many more applications. Applications installed in the smartphones provide useful services, but they may maliciously send sensitive information to a remote location for various purposes ...
Saurabh Kumar, Sandeep Kumar Shukla
openaire +1 more source
IEEE Security & Privacy, 2012
This installment examines the state of website security, by the numbers. It also discusses the most effective way for organizations to achieve sustainable improvements in the security of the code they put on the Web.
openaire +1 more source
This installment examines the state of website security, by the numbers. It also discusses the most effective way for organizations to achieve sustainable improvements in the security of the code they put on the Web.
openaire +1 more source
Network Security, 2012
Security is a discipline concerned with protecting networks and computer systems against threats such as hacking exploits, malware, data leakage, spam and Denial of Service (DoS) attacks, as well as ensuring trusted access through mechanisms such as IPsec or SSL.
openaire +1 more source
Security is a discipline concerned with protecting networks and computer systems against threats such as hacking exploits, malware, data leakage, spam and Denial of Service (DoS) attacks, as well as ensuring trusted access through mechanisms such as IPsec or SSL.
openaire +1 more source
The State of Smartphone Security
Infosecurity, 2011An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn't mean this won't change. Davey Winder investigates…
openaire +1 more source
The Security State and the State of Civil Liberties
Labour / Le Travail, 2004Steve Hewitt, Spying 101. The RCMP's Secret Activities at Canadian Universities, 1917-1997 (Toronto: University of Toronto Press 2002) Gary Kinsman, Dieter K. Buse, and Mercedes Steedman, eds., Whose National Security? Canadian State Surveillance and the Creation of Enemies (Toronto: Between the Lines 2000) W.
Stefan Jensen +5 more
openaire +1 more source
The ‘Security State’ and the Evolution of Security Provision
2009Security is at the very heart of contemporary political life. In the developed states of the North, most individuals’ security is provided by the state — from protection from the internal and external threat of violence to the provision of basic needs — and is therefore contingent on political relationships, mainly found in the link between citizen and
openaire +1 more source

