skip to main content
Show Results with:

Results 1 - 10 of 226  for Everything in this catalogue

results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Material Type:
Article
Add to My workspace

The Image of Nigeria Police: Lessons from History

Ikuteyijo, Lanre; Rotimi, Kemi

Journal of applied security research. Volume 9:Issue 2 (2014); pp 221-235 -- Routledge

Online access

2
Material Type:
Article
Add to My workspace

Democratizing School Safety

Alan Greenberg, Martin

Journal of applied security research. Volume 14:Number 2 (2019, April 3rd); pp 123-139 -- Routledge

Online access

3
Material Type:
Article
Add to My workspace

Politics in the Promotions and Appointments of the Royal Thai Police

Chokprajakchat, Srisombat

Journal of applied security research. Volume 12:Issue 4 (2017); pp 525-542 -- Routledge

Online access

4
Material Type:
Article
Add to My workspace

In Memoriam, Richard W. Kobetz, DPA: October 23, 1933–June 10, 2018

Cooper, H. H. A.

Journal of applied security research. Volume 14:Issue 1 (2019); pp 1-2 -- Routledge

Online access

5
Material Type:
Article
Add to My workspace

Security 101: An Introduction to the Private Security Industry: Joseph J. Jaksa (2016). Durham, NC: Carolina Academic Press, 266 pages plus index 6 pages, $60.00 soft cover.

Christiana, Anthony H.; Cooper, H. H. A.

Journal of applied security research. Volume 13:Number 1 (2018, January 2nd); pp 142-148 -- Routledge

Online access

6
Material Type:
Article
Add to My workspace

Retraction

Journal of applied security research. Volume 11:Issue 4 (2016); pp 540-540 -- Routledge

Online access

7
Material Type:
Article
Add to My workspace

Bryan Burrough, Days of Rage: America's Radical Underground, The FBI & The Forgotten Age of Revolutionary Violence. New York, NY: Penguin Press (2015). 548 pages text, plus 38 pages index, $29.95 (hardcover).

Cooper, H. H. A.

Journal of applied security research. Volume 12:Issue 2 (2017); pp 323-335 -- Routledge

Online access

8
Material Type:
Article
Add to My workspace

EOV Editorial Board

Journal of applied security research. Volume 11:Issue 4 (2016); pp ebi-ebi -- Routledge

Online access

9
Material Type:
Article
Add to My workspace

Effects of Cultural Collectivism on Terrorism Favorability

Peterka-Benton, Daniela; Benton, Bond

Journal of applied security research. Volume 9:Issue 1 (2014); pp 17-40 -- Routledge

Online access

10
Material Type:
Article
Add to My workspace

The Post American World: Release 2.0 by Fareed Zakaria: New York, NY: W.W. Norton (2001/2008), Norton paperback (2012). 289 pages, plus 7 pages of notes and 20 pages of acknowledgements and index, $18.00 (soft cover).

Cooper, H. H. A.

Journal of applied security research. Volume 9:Issue 2 (2014); pp 257-272 -- Routledge

Online access

Results 1 - 10 of 226  for Everything in this catalogue

results 1 2 3 4 5 next page

Refine Search Results

Refine my results

Access Options 

  1. Online: Reading Room only  (164)
  2. Request to Reading Room  (161)
  3. Purchase a copy  (102)
  4. Refine further open sub menu

Subject 

  1. Content-based image retrieval (CBIR)--features--randomized robust learning (RRL)--angular Fourier descriptor (AFD)--images  (4)
  2. Aviation safety--security--TSA  (2)
  3. Boko Haram--crisis--socioeconomic--extremism--government--Nigeria--solutions  (2)
  4. Discretion--justices--sexually indecent act  (2)
  5. Malware detection--preprocessing--feature extraction--Application Programmable Interface (API) call sequences--rule generation--Multi-Dimensional Naïve Bayes Classification (MDNBS)  (2)
  6. Terrorism--Ideology--Tactics  (2)
  7. Legal Enforcement--Ombudsman--Thailand  (2)
  8. Fear of crime--violence--law enforcement--Thailand  (2)
  9. Offensive counterterrorism--recruitment--computational model--agent-based model--terrorism--conflict  (2)
  10. Reversible data hiding--reversible cellular automata--encryption--data security--public cloud  (2)
  11. Image forgery--image tampering detection--local binary pattern--texture descriptor  (2)
  12. Block cipher--cryptanalysis--genetic algorithm--MRVLK--random oracle  (2)
  13. Federal tertiary educational institutions--job insecurity--Nigeria--security outsourcing  (2)
  14. Mobile ad-hoc networks (MANETs)--security aware dual authenticated routing--fuzzy logic control (FLC)--game theory--cipher text policy-attribute based encryption (CP-ABE)  (2)
  15. Biometrics--feature representation--robot-portrait  (2)
  16. Internet of Things (IoT)--actors--sensors--aggregation--security and privacy  (2)
  17. Security--private policing--civil rights--criminal liability  (2)
  18. Nuclear materials--nuclear power plant--threat-security interface--physical protection system--gap analysis  (2)
  19. Refine further open sub menu

Creation date 

From To
  1. Before2014  (7)
  2. 2014To2015  (33)
  3. 2016To2016  (40)
  4. 2017To2018  (103)
  5. After 2018  (43)
  6. Refine further open sub menu

Additional Features 

  1. Abstract  (194)
  2. No Abstract  (32)
  3. Refine further open sub menu

Searching Remote Databases, Please Wait