Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Missouri University of Science & Technology Library.
The Resource
Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Missouri University of Science & Technology Library.
- Label
- Security measures
A sample of Items that are about the Topic Security measures See All
Context
Context of Security measuresSubfocus of
No resources found
No enriched resources found
- 5G mobile communication systems -- Security measures -- United States
- 5G mobile communication systems -- Security measures -- United States -- Planning
- Active server pages -- Security measures
- Ad hoc networks (Computer networks) -- Security measures
- Ad hoc networks (Computer networks) -- Security measures -- Congresses
- Adaptive control systems -- Security measures -- Congresses
- Administrative agencies -- Computer networks | Access control | Security measures
- Administrative agencies -- Computer networks | Security measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States -- Evaluation
- Administrative agencies -- Computer networks | Security measures -- United States -- Planning -- Periodicals
- Administrative agencies -- Computer networks | Security measures | Research -- United States
- Administrative agencies -- Computer networks | Security measures | Research -- United States -- Periodicals
- Administrative agencies -- Data processing | Access control | Security measures
- Administrative agencies -- Data processing | Security measures
- Administrative agencies -- Information resources management | Security measures -- United States
- Administrative agencies -- Information resources management | Security measures -- United States -- Examinations -- Study guides
- Administrative agencies -- Information technology | Security measures -- United States
- Administrative agencies -- Security measures
- Administrative agencies -- Security measures -- United States
- Administrative agencies -- Security measures -- United States -- Evaluation
- Administrative agencies -- Security measures -- United States -- Periodicals
- Administrative agencies -- United States -- Communication systems | Security measures
- Administrative agencies -- United States -- Data processing | Security measures
- Administrative agencies -- United States -- Data processing | Security measures | Evaluation
- Advertising -- Airlines | Security measures -- United States
- Aeronautics -- Law and legislation | Security measures -- United States
- Aeronautics -- Security measures
- Aeronautics -- Security measures
- Aeronautics -- Security measures
- Aeronautics -- Security measures -- United States -- Computer programs
- Aeronautics -- Security measures -- United States -- Evaluation
- Aeronautics -- Security measures -- United States -- Management | Evaluation
- Aeronautics -- Security measures | International cooperation
- Aeronautics -- Security measures | Technological innovations -- United States
- Aeronautics -- United States -- Security measures
- Aeronautics, Commercial -- Freight | Security measures
- Aeronautics, Commercial -- Freight | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Passenger traffic | Security measures | Technological innovations -- United States -- Costs
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures -- California
- Aeronautics, Commercial -- Security measures -- California | Los Angeles
- Aeronautics, Commercial -- Security measures -- Chile
- Aeronautics, Commercial -- Security measures -- Cuba
- Aeronautics, Commercial -- Security measures -- European Union countries
- Aeronautics, Commercial -- Security measures -- Illinois
- Aeronautics, Commercial -- Security measures -- Pacific Area
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States -- Costs
- Aeronautics, Commercial -- Security measures -- United States -- Costs | Evaluation
- Aeronautics, Commercial -- Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Security measures -- United States -- Finance
- Aeronautics, Commercial -- Security measures -- United States -- Management
- Aeronautics, Commercial -- Security measures -- United States -- Planning
- Aeronautics, Commercial -- Security measures -- United States -- Simulation methods -- Congresses
- Aeronautics, Commercial -- Security measures -- United States -- Testing
- Aeronautics, Commercial -- Security measures -- Virginia
- Aeronautics, Commercial -- Security measures -- Washington (D.C.)
- Aeronautics, Commercial -- Security measures -- Washington Metropolitan Area
- Aeronautics, Commercial -- Security measures | Equipment and supplies
- Aeronautics, Commercial -- Security measures | Evaluation
- Aeronautics, Commercial -- Security measures | Government policy -- United States
- Aeronautics, Commercial -- Security measures | International cooperation
- Aeronautics, Commercial -- Security measures | Law and legislation
- Aeronautics, Commercial -- Security measures | Law and legislation -- United States
- Aeronautics, Commercial -- Security measures | Research -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States -- Costs
- Agricultural industries -- Security measures -- United States
- Agriculture -- Security measures -- United States
- Agriculture -- Security measures -- United States -- Evaluation
- Air bases -- Security measures
- Air bases -- Security measures -- United States
- Air bases -- Security measures -- United States -- Case studies
- Air bases, American -- Security measures
- Air traffic control -- Computer networks | Security measures -- United States
- Air traffic control -- United States -- Security measures
- Air travel -- Security measures -- United States
- Airline passenger security screening -- Computer networks | Security measures -- United States
- Airlines -- Management | Security measures
- Airlines -- Security measures
- Airlines -- Security measures
- Airlines -- Security measures -- California
- Airlines -- Security measures -- United States
- Airlines -- Security measures -- United States -- Auditing
- Airlines -- Security measures -- United States -- Evaluation
- Airlines -- Security measures -- United States -- Finance
- Airlines -- Security measures | Economic aspects -- United States
- Airlines -- Security measures | Government policy -- United States
- Airmen -- Medical care -- United States -- Data processing | Security measures
- Airplanes -- Maintenance and repair | Security measures -- Foreign countries
- Airplanes -- Monitoring | Security measures -- United States
- Airport buildings -- Security measures -- United States
- Airports -- Baggage handling | Security measures
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu -- Evaluation
- Airports -- Baggage handling | Security measures -- United States
- Airports -- Baggage handling | Security measures -- United States -- Costs | Evaluation
- Airports -- Baggage handling | Security measures -- United States -- Evaluation
- Airports -- Baggage handling | Security measures -- United States -- Finance
- Airports -- Baggage handling | Security measures -- United States -- Management
- Airports -- Baggage handling | Security measures | Government policy -- United States
- Airports -- Baggage handling | Security measures | International cooperation
- Airports -- Communication systems | Security measures -- Congresses
- Airports -- Evaluation | Security measures -- United States
- Airports -- Information technology | Security measures -- United States
- Airports -- Inspection | Security measures -- United States
- Airports -- Law and legislation | Security measures -- United States
- Airports -- Security measures
- Airports -- Security measures
- Airports -- Security measures
- Airports -- Security measures -- California | Los Angeles
- Airports -- Security measures -- California | Los Angeles -- Costs
- Airports -- Security measures -- California | Ontario -- Costs
- Airports -- Security measures -- Cuba
- Airports -- Security measures -- Florida | Orlando
- Airports -- Security measures -- New Jersey | Newark
- Airports -- Security measures -- Periodicals
- Airports -- Security measures -- United States
- Airports -- Security measures -- United States -- Equipment and supplies
- Airports -- Security measures -- United States -- Evaluation
- Airports -- Security measures -- United States -- Finance
- Airports -- Security measures -- United States -- Management
- Airports -- Security measures -- United States -- Planning
- Airports -- Security measures -- United States -- Simulation methods -- Congresses
- Airports -- Security measures -- United States -- Testing
- Airports -- Security measures -- Washington Metropolitan Area
- Airports -- Security measures | Government policy -- United States
- Airports -- Security measures | International cooperation
- Airports -- Security measures | International cooperation
- Airports -- Security measures | International cooperation
- Airports -- Security measures | Technological innovations -- United States
- Airports -- Security measures | Technological innovations -- United States -- Costs
- Airports -- United States -- Communication systems | Security measures
- Airports -- United States -- Security measures
- Airways -- Security measures -- United States
- Ajax (Web site development technology) -- Security measures
- Ajax (Web site development technology) -- Security measures
- Ajax (Web site development technology) -- Security measures
- Alien detention centers -- Security measures -- United States
- Ammonium nitrate -- Security measures -- United States
- Android (Electronic resource) -- Security measures
- Android (Electronic resource) -- Security measures
- Animal industry -- Security measures -- United States
- Apache Hadoop -- Security measures
- Application program interfaces (Computer software) -- Security measures
- Application software -- Development | Security measures
- Application software -- Security measures
- Application software -- Security measures -- Congresses
- Application software -- Security measures -- United States
- Archives -- Security measures
- Archives -- Security measures
- Archives -- Security measures -- Handbooks, manuals, etc
- Archives -- Security measures -- United States
- Archives -- Security measures | Handbooks, manuals, etc
- Armed Forces -- Security measures
- Arsenals -- Security measures -- United States
- Artificial satellites -- Security measures -- United States
- Artificial satellites in telecommunication -- Security measures -- Congresses
- Astronautics -- Security measures -- Congresses
- Automated tellers -- Security measures
- Automatic control -- Security measures
- Automatic control -- Security measures -- Congresses
- Automatic data collection systems -- Security measures
- Automatic data collection systems -- Security measures
- Automatic data collection systems -- Security measures -- United States
- Automatic machinery -- Security measures
- Automation -- Security measures
- Automation -- Security measures
- Automation -- Security measures
- Automobile supplies industry -- United States -- Security measures
- Automobiles -- Radio equipment | Security measures -- United States
- Automotive computers -- Security measures
- Automotive computers -- Security measures -- Handbooks, manuals, etc
- Automotive telematics -- Security measures -- United States
- Autonomic computing -- Security measures -- Congresses
- BGP (Computer network protocol) -- Security measures | Standards -- United States
- Badges -- Security measures -- United States
- Ballot -- Security measures -- United States
- Banks and banking -- Computer networks | Security measures
- Banks and banking -- Computer networks | Security measures
- Banks and banking -- Security measures
- Banks and banking -- Security measures
- Banks and banking -- United States -- Security measures
- Banks and banking, Mobile -- Security measures
- Big data -- Security measures
- Big data -- Security measures -- Congresses
- Biological laboratories -- Security measures -- United States
- Biological laboratories -- Security measures | Evaluation
- Biological warfare -- Security measures
- Biological warfare -- Security measures -- United States
- Biometric identification -- Security measures
- Biometric identification -- Security measures -- Congresses
- Biotechnology -- Security measures | Technological innovations -- Congresses
- BlackBerry (Computer) -- Security measures
- BlackBerry (Smartphone) -- Security measures
- Blogs -- Security measures
- Bluetooth technology -- Security measures
- Bluetooth technology -- Security measures
- Bluetooth technology -- Security measures | Standards | Government policy -- United States
- Boats and boating -- Security measures -- United States
- Border crossing -- Security measures -- United States
- Border patrols -- Security measures -- United States
- Border stations -- Security measures -- Arizona | Tucson Region -- Evaluation
- Borderlands -- Security measures
- Borderlands -- Security measures -- United States
- Borderlands -- Security measures | Government policy -- Southwestern States
- Borderlands -- Security measures | Government policy -- Southwestern States
- Bridges -- Security measures
- Bridges -- Security measures -- New York (State) | New York Metropolitan Area
- Bridges -- Security measures -- New York Metropolitan Area
- Bridges -- Security measures -- United States
- Bridges -- Security measures -- United States -- Planning
- Broadband communication systems -- Security measures -- United States
- Broadband communication systems -- Security measures | Government policy -- United States
- Browsers (Computer programs) -- Security measures
- Building -- Design and construction | Security measures
- Building leases -- Security measures -- United States
- Building management -- United States -- Automation | Security measures
- Building sites -- Security measures -- United States
- Buildings -- Security measures
- Buildings -- Security measures
- Buildings -- Security measures -- Dictionaries
- Buildings -- Security measures -- Handbooks, manuals, etc
- Buildings -- Security measures -- Periodicals
- Buildings -- Security measures | Evaluation
- Buildings -- United States -- Security measures
- Bus industry -- Security measures -- United States -- Finance
- Bus lines -- Security measures
- Bus lines -- Security measures
- Bus lines -- Security measures -- United States
- Bus lines -- Security measures -- United States -- Finance
- Bus lines -- Security measures -- United States -- Periodicals
- Bus stops -- Security measures -- United States
- Buses -- Europe -- Security measures
- Buses -- Security measures
- Buses -- Security measures -- United States
- Buses -- Security measures -- United States -- Evaluation
- Buses -- Security measures -- United States -- Finance
- Buses -- Security measures -- United States -- States | Finance
- Business -- Data processing | Security measures
- Business -- Data processing | Security measures
- Business -- Data processing | Security measures
- Business -- Data processing | Security measures -- Congresses
- Business -- Data processing | Security measures -- Great Britain -- Planning
- Business -- Data processing | Security measures | Evaluation
- Business -- Data processing | Security measures | Law and legislation
- Business -- Data processing | Security measures | Planning
- Business -- Data processing | Security measures | Planning
- Business -- Data processing | Security measures | Standards -- Great Britain
- Business -- Security measures
- Business -- Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures -- Congresses
- Business enterprises -- Computer networks | Security measures -- Europe
- Business enterprises -- Computer networks | Security measures -- Periodicals
- Business enterprises -- Computer networks | Security measures | Auditing
- Business enterprises -- Computer networks | Security measures | Auditing -- Dictionaries
- Business enterprises -- Computer networks | Security measures | Economic aspects
- Business enterprises -- Computer networks | Security measures | Evaluation
- Business enterprises -- Computer networks | Security measures | Law and legislation
- Business enterprises -- Information technology | Security measures
- Business enterprises -- Security measures
- Business enterprises -- Security measures
- Business enterprises -- Security measures
- Business enterprises -- Security measures -- Australia | Melbourne (Vic.)
- Business enterprises -- Security measures -- Periodicals
- Business enterprises -- Security measures -- United States
- Business enterprises -- Security measures -- United States -- Handbooks, manuals, etc
- Business enterprises -- Security measures -- United States -- Planning
- Business enterprises -- Security measures | Evaluation
- Business enterprises -- Technological innovations | Security measures -- Russia (Federation) -- Case studies
- Business information services -- Security measures
- Business intelligence -- Security measures -- United States -- Handbooks, manuals, etc
- Business logistics -- Security measures
- Business logistics -- Security measures -- United States -- Evaluation
- Business travel -- Security measures
- Business travel -- Security measures -- United States -- Handbooks, manuals, etc
- Cables, Submarine -- Security measures
- Capital market -- Security measures -- United States
- Cargo handling -- Security measures
- Cargo handling -- Security measures
- Cargo handling -- Security measures -- Canada
- Cargo handling -- Security measures -- United States
- Cargo holds -- Security measures | Government policy -- United States
- Cargo ships -- Handling | Security measures
- Casinos -- Security measures
- Casinos -- Security measures -- Handbooks, manuals, etc
- Cell phone services industry -- Security measures
- Cell phone systems -- Security measures
- Cell phone systems -- Security measures -- United States
- Cell phones -- Security measures
- Cell phones -- Security measures -- United States
- Cellular telephone systems -- Security measures
- Cellular telephones -- Security measures
- Centers for Medicare & Medicaid Services (U.S.) -- Computer networks | Security measures
- Centers for Medicare & Medicaid Services (U.S.) -- Data processing | Security measures
- Centers for Medicare & Medicaid Services (U.S.) -- Security measures | Auditing
- Chemical industry -- Security measures -- United States
- Chemical industry -- Security measures -- United States -- Evaluation
- Chemical industry -- Security measures | Government policy -- United States
- Chemical plants -- Security measures
- Chemical plants -- Security measures -- New Jersey
- Chemical plants -- Security measures -- United States
- Chemical plants -- Security measures | Government policy -- United States
- Chemical warfare -- Security measures
- Chemical warfare -- Security measures -- United States
- Chicago O'Hare International Airport -- Security measures | Evaluation
- City planning -- Data processing | Security measures -- Congresses
- Client/server computing -- Security measures
- Client/server computing -- Security measures -- United States
- Cloud computing -- Security measures
- Cloud computing -- Security measures
- Cloud computing -- Security measures -- Congresses
- Cloud computing -- Security measures -- Europe
- Cloud computing -- Security measures -- Examinations, questions, etc
- Cloud computing -- Security measures -- United States
- Cloud computing -- Security measures | Examinations -- Study guides
- Cloud computing -- Security measures | Law and legislation -- European Union countries
- Cluster analysis -- Data processing | Security measures
- Coasts -- Security measures -- China
- Coasts -- Security measures -- United States
- Cognitive radio networks -- Security measures
- Cognitive radio networks -- Security measures -- Congresses
- Cold storage -- Security measures
- Cole (Destroyer : DDG 67) -- Security measures
- Cole (Ship) -- Security measures
- Command and control systems -- Security measures
- Command and control systems -- Security measures -- United States
- Commercial buildings -- Security measures
- Commercial buildings -- Security measures
- Commercial buildings -- Security measures -- United States
- Commercial vehicle industry -- Security measures -- United States
- Communication -- Security measures -- United States
- Communications, Military -- Security measures -- United States
- Computer architecture -- Security measures -- Congresses
- Computer architecture -- Security measures | Standards -- United States
- Computer crimes -- Security measures -- United States
- Computer file sharing -- Security measures
- Computer firmware -- Security measures
- Computer firmware -- Security measures -- United States
- Computer input-output equipment -- Security measures -- Congresses
- Computer network -- Security measures
- Computer network architectures -- Security measures
- Computer network architectures -- Security measures -- United States
- Computer network protocols -- Security measures
- Computer network protocols -- Security measures | Evaluation
- Computer networks -- Computer networks | Security measures
- Computer networks -- Computer networks | Security measures -- United States
- Computer networks -- Examinations | Security measures -- Study guides
- Computer networks -- Management | Security measures
- Computer networks -- Remote access | Security measures
- Computer networks -- Remote access | Security measures
- Computer networks -- Remote access | Security measures -- United States
- Computer networks -- Remote access | Security measures | Standards -- United States
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Case studies
- Computer networks -- Security measures -- Congresses
- Computer networks -- Security measures -- Dictionaries
- Computer networks -- Security measures -- Dictionaries -- Polyglot
- Computer networks -- Security measures -- Examinations, questions, etc
- Computer networks -- Security measures -- Fiction
- Computer networks -- Security measures -- Germany
- Computer networks -- Security measures -- Handbooks, manuals, etc
- Computer networks -- Security measures -- Japan
- Computer networks -- Security measures -- Korea (South)
- Computer networks -- Security measures -- Missouri -- Auditing
- Computer networks -- Security measures -- Periodicals
- Computer networks -- Security measures -- Poland
- Computer networks -- Security measures -- Popular works
- Computer networks -- Security measures -- Problems, exercises, etc
- Computer networks -- Security measures -- Software
- Computer networks -- Security measures -- Study guides
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States -- Auditing
- Computer networks -- Security measures -- United States -- Case studies
- Computer networks -- Security measures -- United States -- Congresses
- Computer networks -- Security measures -- United States -- Evaluation
- Computer networks -- Security measures -- United States -- Handbooks, manuals, etc
- Computer networks -- Security measures -- United States -- Periodicals
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures -- United States -- States
- Computer networks -- Security measures | Auditing
- Computer networks -- Security measures | Case studies
- Computer networks -- Security measures | Computer programs
- Computer networks -- Security measures | Computer programs
- Computer networks -- Security measures | Computer programs
- Computer networks -- Security measures | Congresses
- Computer networks -- Security measures | Data processing
- Computer networks -- Security measures | Design
- Computer networks -- Security measures | Economic aspects -- Congresses
- Computer networks -- Security measures | Evaluation
- Computer networks -- Security measures | Examinations
- Computer networks -- Security measures | Examinations
- Computer networks -- Security measures | Examinations -- Study guides
- Computer networks -- Security measures | Examinations | Study guides
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | Handbooks, manuals, etc
- Computer networks -- Security measures | Handbooks, manuals, etc
- Computer networks -- Security measures | International cooperation
- Computer networks -- Security measures | Law and legislation
- Computer networks -- Security measures | Law and legislation -- United States
- Computer networks -- Security measures | Management
- Computer networks -- Security measures | Management | Testing
- Computer networks -- Security measures | Mathematical models
- Computer networks -- Security measures | Mathematics
- Computer networks -- Security measures | Moral and ethical aspects
- Computer networks -- Security measures | Quality control
- Computer networks -- Security measures | Quality control
- Computer networks -- Security measures | Research -- United States
- Computer networks -- Security measures | Research -- United States -- Finance
- Computer networks -- Security measures | Social aspects
- Computer networks -- Security measures | Social aspects -- Congresses
- Computer networks -- Security measures | Software
- Computer networks -- Security measures | Software
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Standards -- United States
- Computer networks -- Security measures | Technological innovations -- United States
- Computer networks -- Security measures | Testing
- Computer networks -- Security measures | Testing
- Computer networks -- Security measures | Testing
- Computer networks -- Security measures | Vocational guidance
- Computer networks -- Security measures | Vocational guidance -- United States
- Computer programs -- Security measures
- Computer programs -- Security measures
- Computer security -- Security measures
- Computer security -- Security measures -- United States -- Evaluation
- Computer security -- Security measures | Examinations -- Study guides
- Computer software -- Development | Security measures
- Computer software -- Security measures
- Computer software -- Security measures
- Computer software -- Security measures
- Computer software -- Security measures -- Congresses
- Computer software -- Security measures -- United States
- Computer storage devices -- Security measures
- Computer storage devices -- Security measures -- Congresses
- Computer viruses -- Security measures -- United States
- Computer-assisted instruction -- Security measures
- Confidential business information -- Security measures
- Confidential communications -- Taxation | Security measures -- United States -- Periodicals
- Construction industry -- Security measures -- United States
- Consumers -- Computer networks | Security measures
- Container ships -- Security measures -- United States
- Container ships -- Security measures -- United States -- Evaluation
- Container terminals -- Security measures
- Container terminals -- Security measures -- California
- Container terminals -- Security measures -- United States
- Container terminals -- Security measures -- United States -- Evaluation
- Containerization -- Security measures -- Foreign countries
- Containerization -- Security measures -- United States
- Containerization -- Security measures | Technological innovations | Evaluation
- Containers -- Security measures
- Containers -- Security measures -- United States
- Containers -- Security measures | Technological innovations | Evaluation
- Cooperating objects (Computer systems) -- Security measures
- Cooperating objects (Computer systems) -- Security measures -- Congresses
- Copying machines -- Security measures
- Corporations -- Israel -- Security measures
- Corporations -- Security measures
- Corporations -- Security measures
- Corporations -- Security measures
- Corporations -- Security measures -- Asia
- Corporations -- Security measures -- Israel
- Corporations -- Security measures -- Pacific Area
- Corporations -- Security measures -- Periodicals
- Corporations -- Security measures -- United States
- Corporations -- Security measures -- United States -- Handbooks, manuals, etc
- Corporations -- Security measures -- United States -- Periodicals
- Corporations -- Security measures -- United States -- Planning
- Corporations -- Security measures | Costs
- Corporations -- Security measures | Evaluation
- Corporations -- Security measures | Management
- Corporations -- Security measures | Management -- Handbooks, manuals, etc
- Corporations, American -- Foreign countries -- Security measures
- Corporations, American -- Security measures
- Corporations, American -- Security measures
- Corporations, Chinese -- Security measures -- Foreign countries
- Correctional institutions -- Security measures -- United States
- Courthouses -- Security measures
- Courthouses -- Security measures -- California | Los Angeles
- Courthouses -- Security measures -- United States -- Costs
- Courthouses -- Security measures -- United States -- States
- Courthouses -- United States -- Security measures
- Covered bridges -- Security measures -- United States
- Credit bureaus -- Computer networks | Security measures -- United States
- Credit cards -- Security measures
- Credit cards -- Security measures -- Handbooks, manuals, etc
- Credit cards -- Security measures -- United States
- Credit cards -- Security measures | Standards
- Credit cards -- Security measures | Standards -- Handbooks, manuals, etc
- Credit cards -- Security measures | Standards -- United States -- Evaluation
- Crowds -- Security measures -- New Jersey -- Planning
- Crowds -- Security measures -- United States
- Cruise lines -- Security measures
- Cruise lines -- Security measures | Evaluation
- Cruise ships -- Security measures
- Cruise ships -- Security measures
- Cruise ships -- Security measures -- United States
- Cruise ships -- Security measures | Evaluation
- Cryptocurrencies -- Security measures
- Cryptocurrencies -- Security measures -- United States
- Cultural property -- Security measures
- Cultural property -- Security measures -- Handbooks, manuals, etc
- Customs inspection -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures
- Cyberinfrastructure -- Security measures -- Case studies
- Cyberinfrastructure -- Security measures -- Congresses
- Cyberinfrastructure -- Security measures -- Estonia
- Cyberinfrastructure -- Security measures -- Germany
- Cyberinfrastructure -- Security measures -- Norway
- Cyberinfrastructure -- Security measures -- Sweden
- Cyberinfrastructure -- Security measures -- United States
- Cyberinfrastructure -- Security measures -- United States -- Congresses
- Cyberinfrastructure -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures -- United States -- Finance
- Cyberinfrastructure -- Security measures -- United States -- States
- Cyberinfrastructure -- Security measures | Government policy -- Ukraine
- Cyberinfrastructure -- Security measures | Government policy -- United States
- Cyberinfrastructure -- Security measures | Research -- Congresses
- Cyberinfrastructure -- Security measures | Research -- United States
- Cyberinfrastructure -- Security measures | Technological innovations -- United States
- Cyberspace -- Security measures
- Cyberspace -- Security measures
- Cyberspace -- Security measures -- Congresses
- Cyberspace -- Security measures -- Handbooks, manuals, etc
- Cyberspace -- Security measures -- Periodicals
- Cyberspace -- Security measures -- Texas -- Planning
- Cyberspace -- Security measures -- United States
- Cyberspace -- Security measures -- United States -- Management
- Cyberspace -- Security measures -- United States -- Planning
- Cyberspace -- Security measures -- United States -- States
- Cyberspace -- Security measures -- United States -- States | Planning
- Cyberspace -- Security measures | Government policy
- Cyberspace -- Security measures | Government policy -- United States
- Cyberspace -- Security measures | Management
- Cyberspace -- Security measures | Research -- United States
- Cyberterrorism -- Security measures
- Cyberterrorism -- Security measures -- United States
- Dairy products industry -- Security measures -- United States
- Dams -- Security measures -- United States
- Data centers -- Security measures -- United States
- Data mining -- Security measures
- Data mining -- Security measures -- Congresses
- Data protection -- Security measures
- Data protection -- Security measures -- United States
- Data protection -- Security measures | Mathematical models
- Data transmission systems -- Security measures
- Data transmission systems -- Security measures
- Data transmission systems -- Security measures -- Congresses
- Data transmission systems -- Security measures -- Periodicals
- Data transmission systems -- Security measures -- United States
- Data transmission systems -- United States -- Automation | Security measures
- Data warehousing -- Security measures
- Defense industries -- Security measures
- Defense industries -- Security measures
- Defense industries -- Security measures -- Periodicals
- Defense industries -- Security measures -- United States
- Defense industries -- Security measures -- United States -- Evaluation
- Defense industries -- Security measures -- United States -- Periodicals
- Defense information, Classified -- Security measures -- United States -- Evaluation
- Defense information, Classified -- Security measures | International cooperation
- Detector dogs -- Transportation | Security measures
- Detectors -- Security measures
- Digital communications -- Security measures
- Digital communications -- Security measures -- United States
- Digital control systems -- Security measures
- Digital media -- Security measures
- Digital video -- Security measures -- Handbooks, manuals, etc
- Diplomatic and consular service -- Security measures
- Diplomatic and consular service -- Security measures -- United States
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures -- Gabon
- Diplomatic and consular service, American -- Buildings | Security measures -- Iraq
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya | Banghāzī
- Diplomatic and consular service, American -- Buildings | Security measures -- Yemen (Republic)
- Diplomatic and consular service, American -- Buildings | Security measures | Law and legislation
- Diplomatic and consular service, American -- Security measures
- Directory services (Computer network technology) -- Security measures -- United States
- Distributed operating systems (Computers) -- Security measures
- Distributed operating systems (Computers) -- Security measures -- Congresses
- Drinking water -- Security measures -- United States
- Drinking water -- Security measures -- United States -- Finance
- Drinking water -- Security measures | Government policy -- United States
- Drivers' licenses -- Security measures -- United States
- Dwellings -- Security measures
- Dwellings -- Security measures
- Dwellings -- Security measures
- Dwellings -- Security measures -- Amateurs' manuals
- Dwellings -- Security measures -- United States
- Economic development projects -- Security measures -- Afghanistan
- Education -- Computer networks | Security measures -- United States
- Educational technology -- Security measures
- Elections -- Computer networks | Security measures -- United States
- Elections -- Security measures -- United States
- Elections -- United States -- Equipment and supplies | Security measures
- Elections -- United States -- Equipment and supplies | Security measures | Planning
- Electric networks -- Security measures
- Electric networks -- Security measures -- Congresses
- Electric power distribution -- Security measures
- Electric power distribution -- Security measures -- Canada
- Electric power distribution -- Security measures -- Mexico
- Electric power distribution -- Security measures -- United States
- Electric power distribution -- Security measures | Research -- United States
- Electric power distribution -- United States -- Automation | Security measures
- Electric power failures -- Security measures -- United States -- Evaluation
- Electric power systems -- Security measures
- Electric power systems -- Security measures
- Electric power systems -- Security measures
- Electric power systems -- Security measures
- Electric power systems -- Security measures -- Canada
- Electric power systems -- Security measures -- Congresses
- Electric power systems -- Security measures -- Mexico
- Electric power systems -- Security measures -- United States -- Evaluation
- Electric power systems -- Security measures | Government policy -- United States
- Electric power systems -- United States -- Security measures
- Electric power-plants -- Security measures
- Electric substations -- Computer networks | Security measures | Standards
- Electric substations -- Security measures -- United States
- Electric transformers -- Security measures -- United States
- Electric utilities -- Security measures
- Electric utilities -- Security measures
- Electric utilities -- Security measures | Government policy -- United States
- Electric utilities -- United States -- Security measures
- Electronic apparatus and appliances -- Security measures
- Electronic commerce -- Data processing | Security measures -- Russia (Federation) -- Case studies
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures -- Congresses
- Electronic commerce -- Security measures -- Developing countries
- Electronic commerce -- Security measures -- Europe
- Electronic commerce -- Security measures -- United States
- Electronic commerce -- Security measures -- United States -- Public opinion
- Electronic commerce -- Security measures | Standards
- Electronic data interchange -- Security measures
- Electronic data interchange -- Security measures
- Electronic data interchange -- Security measures -- Congresses
- Electronic data processing -- Distributed processing | Security measures
- Electronic data processing -- Distributed processing | Security measures
- Electronic data processing -- Distributed processing | Security measures -- Congresses
- Electronic data processing -- Security measures
- Electronic data processing -- Security measures
- Electronic data processing -- Security measures -- Congresses
- Electronic data processing -- Security measures -- Missouri -- Auditing
- Electronic data processing -- Security measures -- United States
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures -- Bibliography
- Electronic data processing departments -- Security measures -- Congresses
- Electronic data processing departments -- Security measures -- Handbooks, manuals, etc
- Electronic data processing departments -- Security measures -- Missouri -- Auditing
- Electronic data processing departments -- Security measures -- Periodicals
- Electronic data processing departments -- Security measures -- United States -- Auditing
- Electronic data processing departments -- Security measures -- United States -- Congresses
- Electronic data processing departments -- Security measures | Auditing
- Electronic data processing departments -- Security measures | Examinations -- Study guides
- Electronic data processing departments -- Security measures | Standards
- Electronic data processing departments -- United States -- Security measures
- Electronic data processing departments -- United States -- Security measures | Management
- Electronic filing systems -- Security measures -- United States
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures -- Congresses
- Electronic funds transfers -- Security measures -- United States
- Electronic funds transfers -- Security measures | Congresses
- Electronic government information -- Security measures -- United States
- Electronic government information -- Security measures -- United States -- Evaluation
- Electronic government information -- Security measures -- United States -- Handbooks, manuals, etc
- Electronic government information -- Security measures -- United States -- Periodicals
- Electronic government information -- Security measures | Computer programs
- Electronic government information -- Security measures | Evaluation
- Electronic government information -- Security measures | Standards -- United States
- Electronic information resources -- Security measures -- United States
- Electronic mail messages -- Security measures
- Electronic mail messages -- Security measures
- Electronic mail systems -- Security measures
- Electronic mail systems -- Security measures
- Electronic mail systems -- Security measures -- United States
- Electronic mail systems -- Security measures | Data processing
- Electronic records -- Security measures -- United States
- Electronic records -- Security measures -- United States -- Examinations, questions, etc
- Electronic records -- Security measures | Government policy -- United States
- Electronic systems -- Security measures -- Congresses
- Electronic systems -- Security measures -- United States
- Electronic trading of securities -- Security measures -- United States
- Electronic voting -- Computer networks | Security measures -- United States
- Electronic voting -- Security measures -- Illinois
- Electronic voting -- Security measures -- United States
- Embassy buildings -- Security measures
- Embassy buildings -- Security measures
- Embassy buildings -- Security measures -- Afghanistan
- Embassy buildings -- Security measures -- Albania | Tirana
- Embassy buildings -- Security measures -- Congo (Democratic Republic)
- Embassy buildings -- Security measures -- England | London
- Embassy buildings -- Security measures -- Iraq
- Embassy buildings -- Security measures -- Liberia | Monrovia
- Embassy buildings -- Security measures -- Mexico
- Embassy buildings -- Security measures -- United States -- Costs
- Embassy buildings -- Security measures -- United States -- Evaluation
- Embassy buildings -- Security measures | Law and legislation -- United States
- Embassy buildings -- United States -- Security measures
- Embedded computer systems -- Security measures
- Embedded computer systems -- Security measures -- Congresses
- Emergency communication systems -- Security measures -- United States
- Emigration and immigration -- Security measures -- United States
- Energy facilities -- Security measures
- Energy industries -- Information technology | Security measures
- Energy industries -- Security measures
- Energy industries -- Security measures -- Caucasus, South -- Congresses
- Energy industries -- Security measures -- United States
- Energy storage -- Security measures
- Engineering -- Security measures -- Congresses
- Engineering systems -- Security measures
- Engineering systems -- Security measures -- Congresses
- England and Wales, Parliament -- Security measures
- Environmental laboratories -- United States -- Data processing | Security measures
- Equifax, Inc -- Computer networks | Security measures
- Equifax, Inc. -- Computer networks | Security measures
- Executive Office for U.S. Attorneys -- Information technology | Security measures
- Executive departments -- Computer networks | Security measures -- United States
- Executive departments -- Security measures -- United States
- Executive departments -- United States -- Data processing | Security measures
- Experian (Firm) -- Computer networks | Security measures
- Expert systems (Computer science) -- Security measures -- Congresses
- Explosives industry -- Security measures -- United States
- Extranets (Computer networks) -- Security measures
- Extranets (Computer networks) -- Security measures
- Extranets (Computer networks) -- Security measures | Examinations -- Study guides
- Extranets (Computer networks) -- Security measures | Standards -- United States
- Extranets -- Security measures
- Farm produce -- Security measures -- United States
- Federal Deposit Insurance Corporation -- Computer networks | Security measures
- Federal Deposit Insurance Corporation -- Information technology | Security measures
- Federal Deposit Insurance Corporation -- Information technology | Security measures | Evaluation
- Federal Deposit Insurance Corporation -- Security measures
- Federal National Mortgage Association -- Security measures
- Federal Reserve banks -- Information technology | Security measures
- Federal Reserve banks -- Security measures
- Federal Reserve banks -- Security measures | Evaluation
- Federal government -- Computer networks | Security measures -- United States
- Federal government -- Computer networks | Security measures -- United States -- Handbooks, manuals, etc
- Federal government -- Computer networks | Security measures | Standards -- United States
- Federal government -- Computer networks | Security measures | Standards | Government policy -- United States
- Federal government -- Information services | Security measures
- Federal government -- Information technology | Security measures -- United States
- Federal government -- Information technology | Security measures -- United States -- Handbooks, manuals, etc
- Federal government -- Security measures -- United States
- Federal government -- United States -- Computer network resources | Security measures
- Feedback control systems -- Security measures -- Congresses
- Fences -- Security measures
- Ferries -- Security measures -- United States
- Field programmable gate arrays -- Security measures
- File organization (Computer science) -- Security measures
- Finance, Personal -- Security measures
- Financial institutions -- Computer networks | Security measures
- Financial institutions -- Computer networks | Security measures -- United States
- Financial institutions -- Computer networks | Security measures | Government policy -- United States
- Financial institutions -- Security measures -- United States
- Financial services industry -- Computer networks | Security measures -- United States
- Financial services industry -- Security measures
- Financial services industry -- Security measures -- United States
- Financial services industry -- Security measures | Computer networks -- United States
- Firearms -- Security measures -- United States
- Firewalls (Computer security) -- Security measures
- Fixed base operators industry -- Security measures -- United States
- Flash memories (Computers) -- Security measures
- Flight schools -- United States -- Security measures
- Flight training -- Security measures | Government policy -- United States
- Food handling -- Security measures -- United States
- Food industry and trade -- Security measures
- Food industry and trade -- Security measures -- United States -- Handbooks, manuals, etc
- Food industry and trade -- Security measures | Government policy -- United States
- Food industry and trade -- United States -- Security measures
- Food of animal origin -- Transportation | Security measures -- United States
- Food relief -- Security measures -- United States
- Food supply -- Security measures
- Food supply -- Security measures -- United States
- Food supply -- Security measures -- United States -- Evaluation
- Food supply -- Security measures | Government policy -- United States
- Force and energy -- Security measures
- Freddie Mac (Firm) -- Security measures
- Freight and freightage -- Security measures
- Freight and freightage -- Security measures
- Freight and freightage -- Security measures -- Foreign countries
- Freight and freightage -- Security measures -- United States -- Evaluation
- Freight and freightage -- Security measures -- United States -- Finance
- Freight and freightage -- United States -- Security measures
- Gas industry -- Security measures
- Gasoline supply -- Security measures -- United States
- Gated communities -- Security measures
- Geological Survey (U.S.) -- Information technology | Security measures
- Global Information Grid -- Security measures
- Global Positioning System -- Security measures
- Global Positioning System -- Security measures | Data processing
- Global system for mobile communications -- Security measures
- Global system for mobile communications -- Security measures -- Congresses
- Global system for mobile communications -- Security measures -- United States
- Government Web sites -- Security measures -- United States
- Government communication systems -- Security measures
- Government communication systems -- Security measures
- Government communication systems -- Security measures -- United States
- Government communication systems -- Security measures -- United States -- Evaluation
- Government communication systems -- Security measures -- United States -- Periodicals
- Government information -- Computer networks | Security measures -- United States
- Government information -- Data processing | Security measures -- United States
- Government information -- Security measures
- Government information -- Security measures
- Government information -- Security measures -- Georgia | Atlanta -- Evaluation
- Government information -- Security measures -- Illinois | Lisle -- Evaluation
- Government information -- Security measures -- Pennsylvania | King of Prussia -- Evaluation
- Government information -- Security measures -- Texas | Arlington -- Evaluation
- Government information -- Security measures -- United States
- Government information -- Security measures -- United States -- Auditing
- Government information -- Security measures -- United States -- Evaluation
- Government information -- Security measures | Law and legislation -- United States
- Government missions -- United States -- Security measures
- Government property -- Security measures
- Government property -- Security measures
- Government property -- Security measures
- Government property -- Security measures -- Iraq
- Government property -- Security measures -- United States
- Government property -- Security measures -- United States -- Evaluation
- Government property -- Security measures | Standards -- United States
- Green cards -- Security measures | Evaluation
- Guided missiles -- Security measures
- Harbors -- Security measures
- Harbors -- Security measures
- Harbors -- Security measures
- Harbors -- Security measures -- Asia
- Harbors -- Security measures -- California
- Harbors -- Security measures -- California | Long Beach
- Harbors -- Security measures -- California | Los Angeles
- Harbors -- Security measures -- Congresses
- Harbors -- Security measures -- Florida
- Harbors -- Security measures -- Florida | Miami
- Harbors -- Security measures -- Florida | Tampa
- Harbors -- Security measures -- Louisiana | New Orleans
- Harbors -- Security measures -- New York (State) | New York
- Harbors -- Security measures -- Northwest, Pacific
- Harbors -- Security measures -- Oregon
- Harbors -- Security measures -- South Carolina
- Harbors -- Security measures -- Texas | Houston
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States -- Evaluation
- Harbors -- Security measures -- United States -- Finance
- Harbors -- Security measures -- United States -- Periodicals
- Harbors -- Security measures -- Virginia
- Harbors -- Security measures -- Washington (State)
- Harbors -- Security measures | Government policy -- United States
- Harbors -- Security measures | Law and legislation -- United States
- Harbors -- United States -- Security measures
- Hazardous substances -- Security measures -- United States
- Hazardous substances -- Transportation | Security measures
- Hazardous substances -- Transportation | Security measures -- United States
- Hazardous waste sites -- Security measures -- United States
- Health facilities -- Security measures
- Health facilities -- Security measures
- Health facilities -- Security measures -- United States
- Health insurance exchanges -- Security measures -- United States
- Hewlett-Packard computers -- Security measures
- High schools -- Security measures -- Ohio -- Case studies
- High technology industries -- Security measures | Costs
- Highly enriched uranium -- Security measures
- Highly enriched uranium -- Security measures | Evaluation
- Historic sites -- Security measures
- Home automation -- Security measures -- United States
- Home banking services -- Security measures
- Home computer networks -- Security measures
- Home computer networks -- Security measures
- Home computer networks -- Security measures -- United States
- Honolulu International Airport -- Security measures | Evaluation
- Hospital pharmacies -- Security measures -- United States -- Evaluation
- Hospitals -- Security measures
- Hospitals -- Security measures
- Hosting of sporting events -- Security measures
- Hosting of sporting events -- Security measures -- United States
- Hotels -- Security measures
- Hotels -- Security measures
- Household electronics -- Security measures
- Hydroelectric power plants -- Security measures -- United States
- Hydroelectric power plants -- Security measures -- United States -- Finance
- IBM computers -- Security measures
- IBM computers -- Security measures
- IBM computers -- Security measures
- IPSec (Computer network protocol) -- Security measures
- Idaho National Laboratory -- Security measures
- Identification cards -- Security measures -- United States
- Identification cards -- Security measures -- United States -- Evaluation
- Image files -- Security measures
- Image files -- Security measures -- Handbooks, manuals, etc
- Image processing -- Security measures
- Industrial marketing -- Security measures
- Industries -- Security measures
- Industries -- Security measures
- Industries -- Security measures -- Congresses
- Industries -- Security measures -- Great Britain
- Industries -- Security measures -- Periodicals
- Industries -- Security measures -- United States -- Auditing
- Industries -- Security measures -- United States -- Periodicals
- Industries -- Security measures -- United States -- Planning
- Industries -- Security measures | Management
- Industries -- Security measures | Management
- Industries -- United States -- Security measures
- Information networks -- Security measures
- Information networks -- Security measures
- Information networks -- Security measures
- Information networks -- Security measures -- Congresses
- Information networks -- Security measures -- Periodicals
- Information networks -- Security measures | Government policy -- United States
- Information networks -- Security measures | Mathematics
- Information networks -- United States -- Security measures
- Information resources -- Security measures
- Information resources -- Security measures | Government policy -- United States
- Information resources management -- Security measures
- Information resources management -- Security measures
- Information resources management -- Security measures -- United States
- Information science -- Security measures -- Congresses
- Information society -- Security measures -- Congresses
- Information storage and retrieval systems -- Business | Security measures
- Information storage and retrieval systems -- Business | Security measures -- United States
- Information storage and retrieval systems -- Environmental protection | Security measures | Evaluation
- Information storage and retrieval systems -- Finance | Security measures -- United States
- Information storage and retrieval systems -- Finance | Security measures | Government policy -- United States
- Information storage and retrieval systems -- Medical care | Security measures -- Examinations, questions, etc
- Information storage and retrieval systems -- Medical care | Security measures -- United States
- Information storage and retrieval systems -- Security measures
- Information storage and retrieval systems -- Security measures
- Information storage and retrieval systems -- Security measures
- Information storage and retrieval systems -- Security measures -- Congresses
- Information storage and retrieval systems -- Security measures -- Handbooks, manuals, etc
- Information storage and retrieval systems -- Security measures -- Missouri -- Auditing
- Information storage and retrieval systems -- Security measures -- United States
- Information storage and retrieval systems -- Security measures -- United States -- Evaluation
- Information storage and retrieval systems -- Security measures -- United States -- Evaluation -- Periodicals
- Information storage and retrieval systems -- Security measures | Examinations -- Study guides
- Information storage and retrieval systems -- Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures | Handbooks, manuals, etc
- Information storage and retrieval systems -- Security measures | Law and legislation -- United States
- Information storage and retrieval systems -- Security measures | Management
- Information storage and retrieval systems -- Security measures | Standards
- Information storage and retrieval systems -- Security measures | Standards -- United States
- Information storage and retrieval systems -- Telecommunication | Security measures -- United States
- Information storage and retrieval systems -- United States | Security measures
- Information storage and retrieval systems -- United States | Security measures -- United States
- Information storage and retrieval systems -- United States | Security measures -- United States -- Evaluation
- Information storage and retrieval systems -- United States | Security measures | Evaluation
- Information storage and retrieval systems -- United States | Security measures | Government policy
- Information storage and retrieval systems -- United States | Security measures | Government policy -- United States
- Information storage and retrieval systems -- United States | Security measures | Management
- Information storage and retrieval systems -- United States | Security measures | Standards -- United States
- Information storage and retrieval systems -- United States | Security measures | Standards | Government policy
- Information superhighway -- Security measures
- Information superhighway -- Security measures
- Information superhighway -- Security measures
- Information superhighway -- Security measures -- Congresses
- Information superhighway -- Security measures -- United States
- Information superhighway -- Security measures -- United States -- Periodicals
- Information superhighway -- Security measures | Government policy -- United States
- Information technology -- Management | Security measures
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures -- California | Laguna Niguel -- Evaluation
- Information technology -- Security measures -- Congresses
- Information technology -- Security measures -- Congresses | Periodicals
- Information technology -- Security measures -- Dictionaries
- Information technology -- Security measures -- Dictionaries -- Polyglot
- Information technology -- Security measures -- Fiction
- Information technology -- Security measures -- Idaho | Pocatello
- Information technology -- Security measures -- Maryland | Rockville
- Information technology -- Security measures -- Periodicals
- Information technology -- Security measures -- Study guides
- Information technology -- Security measures -- United States -- Auditing
- Information technology -- Security measures -- United States -- Auditing -- Handbooks, manuals, etc
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>