Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Locks and keys --- Collectors and collecting --- Keys --- Locking devices --- Burglary protection --- Fasteners --- Hardware --- Locks and keys - Collectors and collecting
Choose an application
Criminology. Victimology --- Great Britain --- Burglars --- Burglary --- Burglary protection --- Interviews --- Attitudes --- 343.9 --- -Burglars --- -Burglary --- -Burglary protection --- -Building security --- Housing security --- Protection against burglary --- Residential security --- Crime prevention --- Theft --- Thieves --- Criminologie --(algemeen) --- Prevention --- Attitudes. --- Interviews. --- -Criminologie --(algemeen) --- 343.9 Criminologie --(algemeen) --- Building security --- Burglars - England - Interviews --- Burglars - England - Attitudes --- Burglary - England --- Burglary protection - England
Choose an application
Technologies of InSecurity examines how general social and political concerns about terrorism, crime, migration and globalisation are translated into concrete practices of surveillance and securitisation of everyday life. The book is based on contributions from an international panel of leading criminologists, lawyers and surveillance scholars and provides new insights about how broader political issues are translated into concrete and local practices of social control and exclusion.
Internal security --- Security systems --- Security (Psychology) --- Security measures --- Burglary protection --- Emotional insecurity --- Emotional security --- Insecurity (Psychology) --- Psychology, Applied --- Security, Internal --- Insurgency --- Subversive activities
Choose an application
Security has become a defining feature of contemporary public discourse, permeating the so-called 'war on terror', problems of everyday crime and disorder, the reconstruction of 'weak' or 'failed' states and the dramatic renaissance of the private security industry. But what does it mean for individuals to be secure, and what is the relationship between security and the practices of the modern state? In this timely and important book, Ian Loader and Neil Walker outline and defend the view that security remains a valuable public good. They argue that the state is indispensable to the task of fostering and sustaining liveable political communities in the contemporary world and thus pivotal to the project of civilizing security. This is a major contribution by two leading scholars in the field and will be of interest to anyone wishing to deepen their understanding of one the most significant and pressing issues of our times.
National security --- Security systems --- 876 Veiligheidspolitiek --- National security. --- Security systems. --- Democratie. --- Nationale veiligheid. --- Overheidsbeleid. --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Security measures --- Burglary protection --- Government policy --- Social Sciences --- Sociology
Choose an application
National security. --- Security systems industry --- Security systems industry. --- Security systems. --- Security, International. --- National security --- Security, International --- Security systems --- Service industries --- Security measures --- Burglary protection --- Collective security --- International security --- International relations --- Disarmament --- International organization --- Peace --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- Military policy --- Government policy --- Sécurité --- Sécurité publique --- Sécurité privée --- Aspects criminologiques
Choose an application
Corporate governance. --- Internal security. --- Security systems. --- Gouvernement d'entreprise. --- Sécurité, Systèmes de. --- Sûreté de l'État. --- Veiligheid --- Veiligheidsbeleid --- Veiligheid. --- Veiligheidsbeleid. --- Sûreté de l'État. --- Security systems --- Internal security --- Corporate governance --- Security measures --- Burglary protection --- Security, Internal --- Insurgency --- Subversive activities --- Governance, Corporate --- Industrial management --- Directors of corporations
Choose an application
621.391.7 --- Computer security --- Electronic data processing departments --- -Security systems --- -Security measures --- Burglary protection --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Secret systems of electrical communication --- Security measures --- -Secret systems of electrical communication --- 621.391.7 Secret systems of electrical communication --- -Computer privacy --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer department security measures --- Computer security. --- Office Systems --- Security
Choose an application
Private security services --- Security systems --- 351.746 <44> --- -Security systems --- -Security measures --- Burglary protection --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Crime prevention --- Police, Private --- Private military companies --- Security consultants --- Politieke politie. Staatspolitie. Grenspolitie. Vreemdelingenpolitie. Geheimepolitie. Prive politie. Detectives. Lijfwachten. Zedenpolitie. Anti-drugbrigade. prive militie--Frankrijk --- 351.746 <44> Politieke politie. Staatspolitie. Grenspolitie. Vreemdelingenpolitie. Geheimepolitie. Prive politie. Detectives. Lijfwachten. Zedenpolitie. Anti-drugbrigade. prive militie--Frankrijk --- -Politieke politie. Staatspolitie. Grenspolitie. Vreemdelingenpolitie. Geheimepolitie. Prive politie. Detectives. Lijfwachten. Zedenpolitie. Anti-drugbrigade. prive militie--Frankrijk --- Securite --- Security measures --- Safety --- Private security services - France. --- Security systems - France.
Choose an application
Computer networks --- Computer security --- Security measures --- -Computer security --- 681.3*C20 --- 681.3*D46 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security. --- 6813*C20 --- Computer networks. --- Security systems. --- Burglary protection --- Monograph --- Computer networks - Security measures
Choose an application
Computer networks --- Internet (Computer networks) --- Security measures --- -681.3 *C2 --- 681.3*C20 --- 681.3*D46 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer communication networks: data communications OSI security and protection --- Computerwetenschap--?*C20 --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications OSI security and protection --- Firewalls (Computer security) --- Firewalls --- Beveiliging (ICT) --- Internettechnologie --- -005.8 --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Firewalls (Computer security). --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Coupe-feu (Sécurité informatique) --- 005.8 --- #TELE:SYST --- 681.3 *C2 --- Computer architecture. Operating systems --- 6813*C20 --- Internet --- Internet (Computer network) --- COMPUTER NETWORKS --- INTERNET --- Monograph --- Computer networks. --- Security systems. --- Internet. --- DARPA Internet --- Wide area networks (Computer networks) --- World Wide Web --- Burglary protection --- Computer networks - Security measures
Listing 1 - 10 of 10 |
Sort by
|