Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Indiana State Library.This resource has been enriched with EBSCO NoveList data.
The Resource
Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Indiana State Library.
This resource has been enriched with EBSCO NoveList data.
- Label
- Security measures
A sample of Items that are about the Topic Security measures See All
Context
Context of Security measuresSubfocus of
No resources found
No enriched resources found
- Academic libraries -- Security measures
- Administrative agencies -- Computer networks | Security measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States -- Evaluation
- Administrative agencies -- Computer networks | Security measures -- United States -- Evaluation
- Administrative agencies -- Computer networks | Security measures | Research -- United States
- Administrative agencies -- Information resources management | Security measures -- United States
- Administrative agencies -- Information technology | Security measures -- United States
- Administrative agencies -- Security measures -- United States
- Administrative agencies -- Security measures -- United States
- Administrative agencies -- Security measures -- United States -- Evaluation
- Administrative agencies -- United States -- Communication systems | Security measures
- Administrative agencies -- United States -- Data processing | Security measures
- Administrative agencies -- United States -- Data processing | Security measures
- Administrative agencies -- United States -- Data processing | Security measures | Evaluation
- Advertising -- Airlines | Security measures -- United States
- Aeronautics -- Law and legislation | Security measures -- United States
- Aeronautics -- Security measures -- United States
- Aeronautics -- Security measures -- United States
- Aeronautics -- Security measures -- United States -- Computer programs
- Aeronautics -- Security measures -- United States -- Evaluation
- Aeronautics -- Security measures -- United States -- Management | Evaluation
- Aeronautics -- Security measures | Technological innovations -- United States
- Aeronautics, Commercial -- Freight | Security measures
- Aeronautics, Commercial -- Freight | Security measures -- United States
- Aeronautics, Commercial -- Freight | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Passenger traffic | Security measures | Technological innovations -- United States -- Costs
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures -- California
- Aeronautics, Commercial -- Security measures -- California | Los Angeles
- Aeronautics, Commercial -- Security measures -- Cuba
- Aeronautics, Commercial -- Security measures -- Cuba
- Aeronautics, Commercial -- Security measures -- Great Lakes (North America) -- Handbooks, manuals, etc
- Aeronautics, Commercial -- Security measures -- Pacific Area
- Aeronautics, Commercial -- Security measures -- United Arab Emirates | Abū Ẓaby
- Aeronautics, Commercial -- Security measures -- United Arab Emirates | Abū Ẓaby (Emirate)
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Security measures -- United States -- Finance
- Aeronautics, Commercial -- Security measures -- United States -- Handbooks, manuals, etc
- Aeronautics, Commercial -- Security measures -- United States -- Management
- Aeronautics, Commercial -- Security measures -- United States -- Periodicals
- Aeronautics, Commercial -- Security measures -- United States -- Planning
- Aeronautics, Commercial -- Security measures -- United States -- Planning
- Aeronautics, Commercial -- Security measures -- Washington (D.C.)
- Aeronautics, Commercial -- Security measures -- Washington Metropolitan Area
- Aeronautics, Commercial -- Security measures | Equipment and supplies
- Aeronautics, Commercial -- Security measures | Government policy -- United States
- Aeronautics, Commercial -- Security measures | Government policy -- United States
- Aeronautics, Commercial -- Security measures | International cooperation
- Aeronautics, Commercial -- Security measures | International cooperation
- Aeronautics, Commercial -- Security measures | Law and legislation -- United States
- Aeronautics, Commercial -- Security measures | Law and legislation -- United States
- Aeronautics, Commercial -- Security measures | Research -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States -- Costs
- Agricultural industries -- Security measures -- United States
- Agriculture -- Security measures -- United States
- Agriculture -- Security measures -- United States
- Agriculture -- Security measures -- United States -- Evaluation
- Air bases, American -- Security measures
- Air traffic control -- Security measures -- United States
- Air travel -- Security measures -- United States
- Airlines -- Great Britain -- Security measures | International cooperation
- Airlines -- India -- Security measures
- Airlines -- Management | Security measures
- Airlines -- Security measures -- Antigua and Barbuda -- International cooperation
- Airlines -- Security measures -- Argentina -- International cooperation
- Airlines -- Security measures -- Austria -- International cooperation
- Airlines -- Security measures -- Belgium -- International cooperation
- Airlines -- Security measures -- Bolivia -- International cooperation
- Airlines -- Security measures -- Brazil -- International cooperation
- Airlines -- Security measures -- California
- Airlines -- Security measures -- Canada -- International cooperation
- Airlines -- Security measures -- Ecuador -- International cooperation
- Airlines -- Security measures -- Germany -- International cooperation
- Airlines -- Security measures -- Grenada -- International cooperation
- Airlines -- Security measures -- Honduras -- International cooperation
- Airlines -- Security measures -- Ireland -- International cooperation
- Airlines -- Security measures -- Israel -- International cooperation
- Airlines -- Security measures -- Italy -- International cooperation
- Airlines -- Security measures -- Korea -- International cooperation
- Airlines -- Security measures -- Malaysia -- International cooperation
- Airlines -- Security measures -- Nicaragua -- International cooperation
- Airlines -- Security measures -- Peru -- International cooperation
- Airlines -- Security measures -- Romania -- International cooperation
- Airlines -- Security measures -- Saint Kitts and Nevis -- International cooperation
- Airlines -- Security measures -- Singapore -- International cooperation
- Airlines -- Security measures -- South Africa
- Airlines -- Security measures -- Soviet Union -- International cooperation
- Airlines -- Security measures -- Spain -- International cooperation
- Airlines -- Security measures -- Switzerland -- International cooperation
- Airlines -- Security measures -- Turkey -- International cooperation
- Airlines -- Security measures -- United States
- Airlines -- Security measures -- United States -- Evaluation
- Airlines -- Security measures -- United States -- Finance
- Airlines -- Security measures -- United States -- International cooperation
- Airlines -- Security measures -- Uruguay -- International cooperation
- Airlines -- Security measures -- Yugoslavia -- International cooperation
- Airlines -- Security measures -- Zambia -- International cooperation
- Airlines -- Security measures | Economic aspects -- United States
- Airlines -- Security measures | Government policy -- United States
- Airlines -- Security measures | International cooperation
- Airplanes -- Foreign countries -- Maintenance and repair | Security measures
- Airplanes -- Monitoring | Security measures -- United States
- Airport buildings -- Security measures -- United States
- Airports -- Baggage handling | Security measures
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu -- Evaluation
- Airports -- Baggage handling | Security measures -- United States
- Airports -- Baggage handling | Security measures -- United States
- Airports -- Baggage handling | Security measures -- United States -- Evaluation
- Airports -- Baggage handling | Security measures -- United States -- Finance
- Airports -- Baggage handling | Security measures | Government policy -- United States
- Airports -- Baggage handling | Security measures | International cooperation
- Airports -- Inspection | Security measures -- United States
- Airports -- Law and legislation | Security measures -- United States
- trueAirports -- Security measures
- Airports -- Security measures -- California | Los Angeles
- Airports -- Security measures -- California | Los Angeles -- Costs
- Airports -- Security measures -- California | Ontario -- Costs
- Airports -- Security measures -- Cuba
- Airports -- Security measures -- Florida | Orlando
- trueAirports -- Security measures -- United States
- Airports -- Security measures -- United States
- Airports -- Security measures -- United States
- Airports -- Security measures -- United States -- Equipment and supplies
- Airports -- Security measures -- United States -- Evaluation
- Airports -- Security measures -- United States -- Finance
- Airports -- Security measures -- United States -- Periodicals
- Airports -- Security measures -- United States -- Testing
- Airports -- Security measures | International cooperation
- Airports -- Security measures | International cooperation
- Airports -- Security measures | Technological innovations -- United States
- Airports -- Security measures | Technological innovations -- United States
- Airports -- Security measures | Technological innovations -- United States -- Costs
- Airports -- United States -- Communication systems | Security measures
- Airways -- Security measures -- United States
- Alternate Joint Communications Center (U.S.) -- Security measures
- Ammonium nitrate -- Security measures -- United States
- Apartment houses -- Security measures
- Apartment houses -- Security measures -- New York (State) | New York
- Apartment houses -- Security measures -- United States
- Apartment houses -- Security measures -- United States -- Management
- Apartment houses -- Security measures -- Washington (D.C.)
- Application software -- Security measures -- United States
- Architecture, Domestic -- Security measures
- Archives -- Security measures
- Archives -- Security measures -- Handbooks, manuals, etc
- Archives -- Security measures -- United States
- Arsenals -- Security measures -- United States
- Artificial satellites -- Security measures -- United States
- Artificial satellites -- Security measures -- United States
- Automatic data collection systems -- Security measures -- United States
- Automobile supplies industry -- Security measures -- United States
- Automobiles -- Radio equipment | Security measures -- United States
- BGP (Computer network protocol) -- Security measures | Standards -- United States
- Ballot -- Security measures -- United States
- Banks and banking -- Security measures -- United States
- Biological laboratories -- Security measures | Evaluation
- Biological warfare -- Security measures -- United States
- Bluetooth technology -- Security measures | Standards | Government policy -- United States
- Boats and boating -- Security measures -- United States
- Border patrols -- Security measures -- United States
- Border patrols -- Security measures -- United States
- Borderlands -- Security measures -- United States
- Bridges -- Security measures -- New York Metropolitan Area
- Bridges -- Security measures -- United States
- Broadband communication systems -- Security measures -- United States
- Broadband communication systems -- Security measures | Government policy -- United States
- Broadband communication systems -- Security measures | Government policy -- United States
- Buildings -- Security measures
- Buildings -- Security measures -- Handbooks, manuals, etc
- Buildings -- Security measures -- United States
- Bus industry -- Security measures -- United States -- Finance
- Bus lines -- Security measures -- United States
- Bus lines -- Security measures -- United States -- Finance
- Buses -- Security measures -- United States
- Buses -- Security measures -- United States -- Evaluation
- Buses -- Security measures -- United States -- Finance
- Buses -- Security measures -- United States -- States | Finance
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Security measures
- Business enterprises -- Security measures -- United States -- Handbooks, manuals, etc
- Business intelligence -- Security measures -- United States -- Handbooks, manuals, etc
- Business logistics -- Security measures
- Business travel -- Security measures -- United States -- Handbooks, manuals, etc
- Camp Pendleton (Calif.) -- Security measures
- Capital market -- Security measures -- United States
- Cargo handling -- Security measures
- Cargo handling -- Security measures -- Periodicals
- Cargo handling -- Security measures -- United States
- Cargo handling -- Security measures -- United States
- Cargo handling -- Security measures | International cooperation
- Cargo handling -- Security measures | International cooperation
- Cargo holds -- Security measures | Government policy -- United States
- Cargo ships -- Security measures
- Cell phone systems -- Security measures -- United States
- Cell phones -- Security measures -- United States
- Centers for Medicare & Medicaid Services (U.S.) -- Data processing | Security measures
- Chemical industry -- Security measures -- United States
- Chemical plants -- Security measures -- New Jersey
- Chemical plants -- Security measures -- United States
- Chemical plants -- Security measures -- United States
- Chemical plants -- Security measures | Government policy -- United States
- Chemical warfare -- Security measures -- United States
- Client/server computing -- Security measures
- Client/server computing -- Security measures -- United States
- Cloud computing -- Security measures
- Cloud computing -- Security measures -- United States
- Coasts -- Security measures -- United States
- Cole (Destroyer : DDG 67) -- Security measures
- Cole (Ship) -- Security measures
- Command and control systems -- Security measures -- United States
- Commercial vehicle industry -- Security measures -- United States
- Communication -- Security measures -- United States
- Communications, Military -- Security measures -- Handbooks, manuals, etc
- Communications, Military -- Security measures -- United States
- Computer crimes -- Security measures -- United States
- Computer networks -- Remote access | Security measures | Standards -- United States
- trueComputer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Handbooks, manuals, etc
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States -- Databases
- Computer networks -- Security measures -- United States -- Evaluation
- Computer networks -- Security measures -- United States -- Handbooks, manuals, etc
- Computer networks -- Security measures -- United States -- Periodicals
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | Research -- United States
- Computer networks -- Security measures | Research -- United States -- Finance
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Standards -- United States
- Computer networks -- Security measures | Technological innovations -- United States
- Computer networks -- Security measures | Technological innovations -- United States
- Computer networks -- Security measures | Testing
- Computer viruses -- Security measures -- United States
- Confidential communications -- Taxation | Security measures -- United States -- Periodicals
- Consumers -- Computer networks | Security measures
- Container ships -- Security measures -- United States
- Container ships -- Security measures -- United States -- Evaluation
- Container terminals -- Security measures
- Container terminals -- Security measures -- California
- Container terminals -- Security measures -- United States
- Container terminals -- Security measures -- United States -- Evaluation
- Containerization -- Security measures -- Foreign countries
- Containerization -- Security measures -- United States
- Containers -- Security measures
- Containers -- Security measures -- United States
- Corporations -- Security measures -- United States
- Corporations -- Security measures | Costs
- Corporations -- Security measures | Management
- Correctional institutions -- Security measures -- United States
- Correctional institutions -- Security measures -- United States -- Handbooks, manuals, etc
- Cosmetics industry -- Security measures -- United States
- Courthouses -- Security measures -- California | Los Angeles
- Courthouses -- Security measures -- United States
- Courthouses -- Security measures -- United States -- Costs
- Courthouses -- Security measures -- United States -- Handbooks, manuals, etc
- Courthouses -- Security measures -- United States -- States
- Credit bureaus -- Computer networks | Security measures -- United States
- Credit bureaus -- Computer networks | Security measures -- United States
- Credit bureaus -- United States -- Data processing | Security measures
- Credit cards -- Security measures -- United States
- Credit cards -- Security measures | Standards -- United States -- Evaluation
- Crowds -- Security measures -- New Jersey -- Planning
- Crowds -- Security measures -- United States
- Cruise lines -- Security measures
- Cruise lines -- Security measures | Evaluation
- Cruise ships -- Security measures
- Cruise ships -- Security measures -- United States
- Cruise ships -- Security measures | Evaluation
- Cruise ships -- Security measures | International cooperation
- Cyberinfrastructure -- Security measures -- United States
- Cyberinfrastructure -- Security measures -- United States
- Cyberinfrastructure -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures -- United States -- Finance
- Cyberinfrastructure -- Security measures -- United States -- Finance
- Cyberinfrastructure -- Security measures | Government policy -- Ukraine
- Cyberinfrastructure -- Security measures | Government policy -- Ukraine
- Cyberinfrastructure -- Security measures | Government policy -- United States
- Cyberinfrastructure -- Security measures | Government policy -- United States
- Cyberinfrastructure -- Security measures | Research -- United States
- Cyberinfrastructure -- Security measures | Research -- United States
- Cyberinfrastructure -- Security measures | Technological innovations -- United States
- Cyberinfrastructure -- Security measures | Technological innovations -- United States
- Cyberspace -- Security measures
- Cyberspace -- Security measures
- Cyberspace -- Security measures -- Europe
- Cyberspace -- Security measures -- Europe
- Cyberspace -- Security measures -- Texas -- Planning
- Cyberspace -- Security measures -- Texas -- Planning
- Cyberspace -- Security measures -- United States
- trueCyberspace -- Security measures -- United States
- Cyberspace -- Security measures -- United States -- Management
- Cyberspace -- Security measures -- United States -- Management
- Cyberspace -- Security measures -- United States -- Planning
- Cyberspace -- Security measures -- United States -- States | Planning
- Cyberspace -- Security measures | Government policy -- United States
- Cyberspace -- Security measures | Government policy -- United States
- Cyberterrorism -- Security measures -- United States
- Dairy products industry -- Security measures -- United States
- Dams -- Security measures -- United States
- Data protection -- Security measures
- Data protection -- Security measures -- United States
- Defense contracts -- United States -- Data processing | Security measures
- Defense industries -- Security measures
- Defense industries -- Security measures -- United States
- Defense industries -- Security measures -- United States -- Evaluation
- Defense information, Classified -- Security measures -- United States -- Evaluation
- Digital control systems -- Security measures
- Digital mapping -- Security measures -- United States
- Diplomatic and consular service -- Security measures -- United States
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures | Law and legislation
- Diplomatic and consular service, American -- Buildings | Security measures | Law and legislation
- Diplomatic and consular service, American -- Iraq -- Buildings | Security measures
- Diplomatic and consular service, American -- Libya -- Buildings | Security measures
- Diplomatic and consular service, American -- Libya -- Buildings | Security measures
- Diplomatic and consular service, American -- Libya | Banghāzī -- Buildings | Security measures
- Diplomatic and consular service, American -- Libya | Banghāzī -- Buildings | Security measures
- Diplomatic and consular service, American -- Security measures
- Diplomatic and consular service, American -- Yemen (Republic) -- Buildings | Security measures
- Diplomatic and consular service, American -- Yemen (Republic) -- Buildings | Security measures
- Drinking water -- Security measures -- United States
- Drinking water -- Security measures -- United States -- Finance
- Drinking water -- Security measures | Government policy -- United States
- Drivers' licenses -- Security measures -- United States
- Dulles International Airport -- Security measures
- Dwellings -- Security measures
- Dwellings -- Security measures -- Bibliography
- Dwellings -- Security measures -- Handbooks, manuals, etc
- Dwellings -- Security measures -- United States
- Dwellings -- Security measures -- United States -- Handbooks, manuals, etc
- Economic development projects -- Security measures -- Afghanistan
- Education -- Computer networks | Security measures -- United States
- Elections -- Security measures -- United States
- Elections -- United States -- Equipment and supplies | Security measures
- Electric power distribution -- Security measures -- United States
- Electric power distribution -- Security measures -- United States
- Electric power distribution -- Security measures | Research -- United States
- Electric power distribution -- Security measures | Research -- United States
- Electric power failures -- Security measures -- United States -- Evaluation
- Electric power systems -- Security measures -- United States
- Electric power systems -- Security measures -- United States
- Electric power systems -- Security measures -- United States -- Evaluation
- Electric power transmission -- Security measures -- United States
- Electric power transmission -- Security measures -- United States
- Electric utilities -- Security measures -- United States
- Electric utilities -- Security measures -- United States
- Electric utilities -- Security measures | Government policy -- United States
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures -- United States
- Electronic commerce -- Security measures -- United States -- Public opinion
- Electronic commerce -- Security measures | Standards
- Electronic data interchange -- Security measures
- Electronic data processing -- Distributed processing | Security measures
- Electronic data processing -- Security measures
- Electronic data processing -- Security measures -- United States
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures -- Bibliography
- Electronic data processing departments -- Security measures -- Congresses
- Electronic data processing departments -- Security measures -- Handbooks, manuals, etc
- Electronic data processing departments -- Security measures -- United States
- Electronic data processing departments -- Security measures -- United States -- Congresses
- Electronic data processing departments -- Security measures -- United States -- Handbooks, manuals, etc
- Electronic data processing departments -- Security measures -- United States -- Management
- Electronic data processing departments -- Security measures | Auditing
- Electronic data processing departments -- Security measures | Standards
- Electronic data processing departments -- Security measures | Standards -- United States
- Electronic filing of tax returns -- Security measures -- United States
- Electronic filing systems -- Security measures -- United States
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures -- United States
- Electronic government information -- Security measures -- United States
- Electronic government information -- Security measures -- United States
- Electronic government information -- Security measures | Standards -- United States
- Electronic information resources -- Security measures -- United States
- Electronic mail messages -- Security measures -- United States
- Electronic mail messages -- Security measures -- United States
- Electronic mail systems -- Security measures
- Electronic mail systems -- Security measures -- United States
- Electronic mail systems -- Security measures -- United States
- Electronic records -- Security measures -- United States
- Electronic records -- Security measures -- United States -- Examinations, questions, etc
- Electronic records -- Security measures | Government policy -- United States
- Electronic systems -- Security measures -- United States
- trueElectronic voting -- Security measures -- United States
- Electronic voting -- Security measures -- United States
- trueEmbassy buildings -- Security measures
- Embassy buildings -- Security measures -- Afghanistan
- Embassy buildings -- Security measures -- Albania | Tirana
- Embassy buildings -- Security measures -- Central African Republic
- Embassy buildings -- Security measures -- England | London
- Embassy buildings -- Security measures -- England | London
- Embassy buildings -- Security measures -- Iraq
- Embassy buildings -- Security measures -- Liberia | Monrovia
- Embassy buildings -- Security measures -- Libya | Banghāzī
- Embassy buildings -- Security measures -- Mexico
- trueEmbassy buildings -- Security measures -- United States
- Embassy buildings -- Security measures -- United States -- Costs
- Embassy buildings -- Security measures -- United States -- Evaluation
- Embassy buildings -- Security measures -- United States -- Finance
- Embassy buildings -- Security measures | Law and legislation
- Emigration and immigration -- Security measures -- United States
- Energy industries -- Security measures
- Energy industries -- Security measures -- United States
- Energy storage -- Security measures -- United States
- Equifax, Inc. -- Computer networks | Security measures
- Europe, Northern -- Security measures
- Executive departments -- Computer networks | Security measures -- United States
- Executive departments -- Security measures -- United States
- Executive departments -- Security measures -- United States -- Costs
- Executive departments -- United States -- Data processing | Security measures
- Experian (Firm) -- Computer networks | Security measures
- Experian (Firm) -- Computer networks | Security measures
- Explosives industry -- Security measures -- United States
- Extranets (Computer networks) -- Security measures | Standards -- United States
- Federal Deposit Insurance Corporation -- Computer networks | Security measures
- Federal Deposit Insurance Corporation -- Computer networks | Security measures
- Federal Reserve banks -- Information technology | Security measures
- Federal Reserve banks -- Security measures
- Federal Reserve banks -- Security measures | Evaluation
- Federal government -- Computer networks | Security measures -- United States
- Federal government -- Computer networks | Security measures | Standards -- United States
- Federal government -- Information services | Security measures
- Federal government -- Security measures -- United States
- Federal government -- United States -- Computer network resources | Security measures
- Fences -- Security measures
- Financial institutions -- Security measures -- United States
- Financial services industry -- Computer networks | Security measures -- United States
- Financial services industry -- Security measures -- United States
- Financial services industry -- Security measures -- United States
- Financial services industry -- United States -- Databases | Security measures
- Firearms -- Security measures -- United States
- Flight training -- Security measures | Government policy -- United States
- Food handling -- Security measures -- United States
- Food industry and trade -- Security measures -- United States
- Food industry and trade -- Security measures -- United States
- Food industry and trade -- Security measures -- United States -- Handbooks, manuals, etc
- Food industry and trade -- Security measures | Government policy -- United States
- Food relief -- Security measures -- United States
- trueFood supply -- Security measures -- United States
- Food supply -- Security measures -- United States
- Food supply -- Security measures -- United States -- Evaluation
- Food supply -- Security measures | Government policy -- United States
- Force and energy -- United States -- Security measures
- Fort Bragg (N.C.) -- Security measures
- Freight and freightage -- Security measures
- Freight and freightage -- Security measures -- Foreign countries
- Freight and freightage -- Security measures -- Periodicals
- Freight and freightage -- Security measures -- United States
- Freight and freightage -- Security measures -- United States -- Evaluation
- Freight and freightage -- Security measures -- United States -- Finance
- Gasoline supply -- Security measures -- United States
- Global Positioning System -- Security measures -- United States
- Government Web sites -- Security measures -- United States
- Government communication systems -- Security measures -- United States
- Government communication systems -- Security measures -- United States -- Periodicals
- Government information -- Computer networks | Security measures -- United States
- Government information -- Security measures -- United States
- Government information -- United States -- Data processing | Security measures
- Government information -- United States -- Data processing | Security measures
- Government missions -- Security measures -- United States
- Government property -- Security measures
- Government property -- Security measures -- Iraq
- Government property -- Security measures -- United States
- Government property -- Security measures -- United States -- Evaluation
- Harbors -- Security measures
- Harbors -- Security measures -- California
- Harbors -- Security measures -- California
- Harbors -- Security measures -- California | Long Beach
- Harbors -- Security measures -- California | Los Angeles
- Harbors -- Security measures -- Florida
- Harbors -- Security measures -- Florida | Miami
- Harbors -- Security measures -- Florida | Tampa
- Harbors -- Security measures -- Louisiana | New Orleans
- Harbors -- Security measures -- New York (State) | New York
- Harbors -- Security measures -- Northwest, Pacific
- Harbors -- Security measures -- Oregon
- Harbors -- Security measures -- South Carolina
- Harbors -- Security measures -- Texas | Houston
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States -- Abstracts
- Harbors -- Security measures -- United States -- Evaluation
- Harbors -- Security measures -- United States -- Finance
- Harbors -- Security measures -- United States -- Periodicals
- Harbors -- Security measures -- Virginia
- Harbors -- Security measures -- Washington (State)
- Harbors -- Security measures | Law and legislation -- United States
- Hazardous substances -- Transportation | Security measures -- United States
- Health facilities -- Security measures
- Health insurance exchanges -- Security measures -- United States
- High school buildings -- Security measures -- Florida | Broward County
- High schools -- Security measures -- Ohio -- Case studies
- Honolulu International Airport -- Security measures | Evaluation
- Hospital pharmacies -- Security measures -- United States -- Evaluation
- Hospital pharmacies -- Security measures -- United States -- Evaluation
- Housing -- Security measures -- United States
- Hydroelectric power plants -- Security measures -- United States
- Hydroelectric power plants -- Security measures -- United States -- Finance
- Idaho National Laboratory -- Security measures
- Identification cards -- Security measures -- United States
- Industries -- Security measures
- Industries -- Security measures -- Handbooks, manuals, etc
- Industries -- Security measures -- United States
- Industries -- Security measures -- United States
- Industries -- Security measures -- United States -- Evaluation -- Periodicals
- Industries -- Security measures -- United States -- Handbooks, manuals, etc
- Industries -- Security measures | Costs
- Industries -- Security measures | Management
- Information networks -- Security measures
- Information networks -- Security measures -- Congresses
- Information networks -- Security measures -- United States
- Information networks -- Security measures -- United States -- Databases
- Information networks -- Security measures | Government policy -- United States
- Information resources -- Security measures | Government policy -- United States
- Information storage and retrieval systems -- Business | Security measures -- United States
- Information storage and retrieval systems -- Environmental protection | Security measures | Evaluation
- Information storage and retrieval systems -- Finance | Security measures -- United States
- Information storage and retrieval systems -- Finance | Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures
- Information storage and retrieval systems -- Security measures -- Handbooks, manuals, etc
- Information storage and retrieval systems -- Security measures -- United States
- Information storage and retrieval systems -- Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures | Standards
- Information storage and retrieval systems -- Security measures | Standards -- United States
- Information storage and retrieval systems -- Telecommunication | Security measures -- United States
- Information storage and retrieval systems -- United States -- Security measures | Evaluation
- Information storage and retrieval systems -- United States | Security measures
- Information storage and retrieval systems -- United States | Security measures -- United States -- Evaluation
- Information storage and retrieval systems -- United States | Security measures | Evaluation
- Information storage and retrieval systems -- United States | Security measures | Government policy
- Information storage and retrieval systems -- United States | Security measures | Government policy
- Information storage and retrieval systems -- United States | Security measures | Government policy -- United States
- Information superhighway -- Security measures
- Information superhighway -- Security measures -- Congresses
- Information superhighway -- Security measures -- United States
- Information superhighway -- Security measures -- United States -- Periodicals
- Information technology -- Security measures
- Information technology -- Security measures -- United States
- Information technology -- Security measures -- United States
- Information technology -- Security measures -- United States -- Auditing -- Handbooks, manuals, etc
- Information technology -- Security measures -- United States -- Databases
- Information technology -- Security measures -- United States -- Handbooks, manuals, etc
- Information technology -- Security measures -- United States -- Planning
- Information technology -- Security measures | Employees | Training of
- Information technology -- Security measures | Evaluation
- Information technology -- Security measures | Government policy -- United States
- Information technology -- Security measures | Standards
- Information technology -- Security measures | Standards -- United States
- Infrastructure (Economics) -- Security measures
- Infrastructure (Economics) -- Security measures -- Iraq
- Infrastructure (Economics) -- Security measures -- United States
- Infrastructure (Economics) -- Security measures -- United States
- Infrastructure (Economics) -- Security measures -- United States -- Planning
- Infrastructure (Economics) -- Security measures | Government policy -- United States
- Infrastructure (Economics) -- United States -- Data processing | Security measures
- Insurance exchanges -- Security measures -- United States
- Integrated services digital networks -- Security measures
- Intelligent Transportation Systems -- Security measures
- International Atomic Energy Agency -- Security measures
- International airports -- Security measures
- International airports -- Security measures
- International airports -- Security measures | International cooperation
- International business enterprises -- Security measures
- International business enterprises -- Security measures -- United States
- International business enterprises -- Security measures -- United States -- Handbooks, manuals, etc
- International travel -- Security measures -- United States
- International travel -- Security measures -- United States
- International travel regulations -- Security measures -- United States
- International travel regulations -- Security measures -- United States
- Internet -- Security measures
- trueInternet -- Security measures
- Internet -- Security measures -- Asia
- Internet -- Security measures -- United States
- Internet -- Security measures -- United States
- Internet -- Security measures | Government policy -- European Union countries
- Internet -- Security measures | Government policy -- United States
- Internet -- Security measures | Research -- United States
- Internet advertising -- Security measures -- United States
- Internet and children -- Security measures -- United States -- Evaluation
- Internet auctions -- Security measures -- United States
- Internet domain names -- Security measures
- Internet in medicine -- Security measures -- United States
- Internet in political campaigns -- Security measures -- United States
- Internet of things -- Security measures -- United States
- Internet service providers -- Security measures -- United States
- Internet telephony -- Security measures -- United States
- Investments, Foreign -- Security measures -- United States
- Jails -- Security measures -- United States
- Job Corps (U.S.) -- Security measures
- Job Corps (U.S.) -- Security measures
- Laboratories -- Security measures -- United States
- Law enforcement -- United States -- Information services | Security measures
- Lawrence Livermore Laboratory -- Security measures
- Lawrence Livermore National Laboratory -- Security measures
- Legislative bodies -- United States -- Security measures
- Libraries -- Security measures
- Libraries -- Security measures -- Congresses
- Libraries -- Security measures -- Handbooks, manuals, etc
- Libraries -- Security measures -- Periodicals
- Libraries -- Security measures -- United States
- Libraries -- Security measures | Planning
- Library information networks -- Security measures
- Library information networks -- Security measures -- Handbooks, manuals, etc
- Liquefied gases -- Transportation | Security measures
- Liquefied gases -- Transportation | Security measures -- United States
- Liquefied natural gas shipping terminals -- Security measures -- Long Island Sound (N.Y. and Conn.)
- Liquefied natural gas shipping terminals -- Security measures -- Maryland | Baltimore County
- Local area networks (Computer networks) -- Security measures -- United States
- Local transit -- Security measures
- Local transit -- Security measures -- New York (State) | New York
- Local transit -- Security measures -- United States
- Local transit -- Security measures -- United States
- Local transit -- Security measures -- United States -- Congresses
- Local transit -- Security measures -- United States -- Finance
- Local transit -- Security measures -- United States -- States | Finance
- Local transit -- Security measures -- Washington Metropolitan Area
- Local transit -- Security measures | Government policy -- United States
- Local transit -- Security measures | Technological innovations -- United States
- Logan International Airport -- Security measures -- United States
- trueLos Alamos National Laboratory -- Security measures
- Los Alamos Scientific Laboratory -- Security measures
- Marine terminals -- Security measures -- California
- Marine terminals -- Security measures -- California | Long Beach
- Marine terminals -- Security measures -- California | Los Angeles
- Marine terminals -- Security measures -- Florida
- Marine terminals -- Security measures -- Louisiana | New Orleans
- Marine terminals -- Security measures -- New York (State) | New York
- Marine terminals -- Security measures -- Northwest, Pacific
- Marine terminals -- Security measures -- Oregon
- Marine terminals -- Security measures -- United States
- Marine terminals -- Security measures -- Washington (State)
- Marines -- Security measures -- Lebanon
- Meat industry and trade -- Security measures -- United States
- Meat inspection -- Security measures
- Medical care -- Information technology | Security measures
- Medical informatics -- Security measures -- United States
- Medical informatics -- Security measures | Government policy -- United States
- Medical laboratories -- Security measures -- United States
- Medical records -- Data processing | Security measures
- Medical records -- Data processing | Security measures
- Medical records -- Security measures -- United States
- Medical records -- Security measures -- United States
- Medicare -- Claims administration | Computer networks | Security measures
- trueMerchant marine -- Security measures
- Merchant marine -- Security measures -- United States
- Merchant ships -- Security measures | Government policy -- United States
- Metropolitan areas -- Security measures -- United States
- Metropolitan areas -- Security measures -- United States -- Finance
- Mexican-American Border Region -- Security measures
- Mexican-American Border Region -- Security measures
- Microbiological laboratories -- Security measures -- United States
- Microcomputers -- Security measures
- Microcomputers -- Security measures -- United States
- Microcomputers -- Security measures | Computer programs
- Microsoft Corporation -- Security measures -- Case studies
- Miesau Army Depot (Germany) -- Security measures
- Military art and science -- Technological innovations | Security measures -- United States
- Military bases -- Security measures
- Military bases -- Security measures -- Lebanon | Beirut
- Military bases -- Security measures -- United States
- Military bases, American -- Security measures
- Military bases, American -- Security measures -- Afghanistan
- Military bases, American -- Security measures -- Foreign countries
- Military bases, American -- Security measures -- Lebanon | Beirut
- Military bases, American -- Security measures -- Middle East
- Military bases, American -- Security measures -- Turkey
- Military exchanges -- Security measures -- Panama
- Military maneuvers -- Security measures
- Military research -- Security measures -- United States
- Mobile communication systems -- Security measures -- United States
- Mobile communication systems -- Security measures -- United States
- Mobile computing -- Security measures
- Mobile computing -- Security measures -- United States
- Monuments -- Security measures -- United States
- Monuments -- Security measures -- Washington (D.C.)
- Motels -- Security measures -- United States
- Motor vehicles -- Security measures
- Museums -- Security measures
- Museums -- Security measures -- United States
- National Airspace System (U.S.) -- Security measures
- National Finance Center (U.S.) -- Security measures
- National Institute of Standards and Technology (U.S.) -- Buildings | Security measures
- National Institute of Standards and Technology (U.S.) -- Security measures
- National Institute of Standards and Technology (U.S.) -- Security measures
- National parks and reserves -- Security measures -- United States
- Natural gas -- Storage | Security measures -- United States
- Natural gas pipelines -- Security measures -- United States
- Natural gas pipelines -- Security measures -- United States
- Naval Civil Engineering Laboratory (Port Hueneme, Calif.) -- Security measures
- Naval Research Laboratory (U.S.) -- Security measures
- Navy-yards and naval stations -- Security measures -- United States
- Navy-yards and naval stations, American -- Security measures -- United States
- Neighborhoods -- Security measures
- Network computers -- Security measures -- United States
- Nevada Test Site (Nev.) -- Security measures -- Periodicals
- Non-governmental organizations -- Security measures
- North Atlantic Treaty Organization -- Security measures
- North Texas Health Care System (U.S.) -- Security measures
- Northrop Corporation, Advanced Systems Division -- Security measures
- Nuclear energy -- Research | Laboratories | Security measures -- New Mexico | Los Alamos
- Nuclear energy -- Research | Laboratories | Security measures -- United States
- Nuclear energy -- Security measures
- Nuclear energy -- Security measures -- Korea (South)
- Nuclear energy -- Security measures -- United States
- Nuclear energy -- Security measures -- United States -- Handbooks, manuals, etc
- Nuclear energy -- Security measures -- United States -- Statistical methods
- Nuclear energy -- Technological innovations | Security measures
- Nuclear energy industries -- Security measures | International cooperation
- Nuclear facilities -- Security measures
- Nuclear facilities -- Security measures -- Former Soviet republics
- Nuclear facilities -- Security measures -- France
- Nuclear facilities -- Security measures -- Germany
- Nuclear facilities -- Security measures -- Germany (West)
- Nuclear facilities -- Security measures -- Great Britain
- Nuclear facilities -- Security measures -- Handbooks, manuals, etc
- Nuclear facilities -- Security measures -- New Mexico
- Nuclear facilities -- Security measures -- Russia (Federation)
- Nuclear facilities -- Security measures -- South Carolina
- Nuclear facilities -- Security measures -- Spain
- Nuclear facilities -- Security measures -- Tennessee -- Evaluation
- Nuclear facilities -- Security measures -- United States
- Nuclear facilities -- Security measures -- United States -- Equipment and supplies | Management
- Nuclear facilities -- Security measures -- United States -- Evaluation
- Nuclear facilities -- Security measures -- United States -- Finance
- Nuclear facilities -- Security measures -- United States -- Planning
- Nuclear facilities -- Security measures | Government policy -- United States
- Nuclear facilities -- Security measures | International cooperation
- Nuclear fuel elements -- Security measures
- Nuclear fuels -- Security measures -- United States
- Nuclear fuels -- Security measures | International cooperation
- Nuclear industry -- Security measures
- Nuclear industry -- Security measures -- Former Soviet republics
- Nuclear industry -- Security measures -- Russia (Federation)
- Nuclear industry -- Security measures -- United States
- Nuclear industry -- Security measures -- United States -- Evaluation
- Nuclear industry -- Security measures -- United States -- Inventories
- Nuclear nonproliferation -- Security measures -- United States
- Nuclear power plants -- Security measures
- Nuclear power plants -- Security measures -- Handbooks, manuals, etc
- Nuclear power plants -- Security measures -- Pennsylvania
- Nuclear power plants -- Security measures -- United States
- Nuclear power plants -- Security measures -- United States
- Nuclear power plants -- Security measures -- United States -- Handbooks, manuals, etc
- Nuclear reactors -- Security measures -- United States
- Nuclear weapons -- Security measures
- Nuclear weapons -- Security measures -- Russia
- Nuclear weapons -- Security measures -- United States
- Nuclear weapons -- Security measures -- United States
- Nuclear weapons -- Security measures -- United States -- Finance
- Nuclear weapons -- Security measures -- United States -- Handbooks, manuals, etc
- Nuclear weapons -- Security measures | Government policy -- United States
- Nuclear weapons -- Storage | Security measures | Data processing
- Nuclear weapons industry -- Security measures -- United States
- Nuclear weapons information -- Security measures
- Nuclear weapons plants -- Security measures
- Nuclear weapons plants -- Security measures -- New Mexico | Los Alamos
- Nuclear weapons plants -- Security measures -- Russia (Federation) -- Fiction
- Nuclear weapons plants -- Security measures -- United States
- Office buildings -- Security measures
- Office buildings -- Security measures -- United States
- Offices -- Security measures
- Official secrets -- Security measures -- United States
- Offshore structures -- Security measures -- United States
- Offshore structures -- Security measures | International cooperation
- Olympic Games, 2004, Athens, Greece -- Security measures
- Olympic Winter Games, 2010, Vancouver, B.C. -- Security measures
- Olympics -- Security measures
- Olympics -- Security measures -- United States -- Planning
- trueOnline social networks -- Security measures
- Online social networks -- Security measures -- United States
- Outdoor recreation -- Security measures -- California -- Congresses
- Pantex Plant (U.S.) -- Security measures
- Parking facilities -- Security measures -- United States
- Parking lots -- Security measures -- United States
- Passenger ships -- Security measures | International cooperation
- Passenger trains -- Security measures -- United States
- Passenger trains -- Security measures -- United States
- Passenger trains -- Security measures -- United States -- Finance
- Peace Corps (U.S.) -- Security measures
- Peace Corps (U.S.) -- Security measures | Evaluation
- Peer-to-peer architecture (Computer networks) -- Security measures
- Pension Benefit Guaranty Corporation -- Security measures
- Petroleum -- Storage | Security measures -- Texas
- Petroleum -- Transportation | Security measures -- Texas | Houston
- Petroleum industry and trade -- Security measures
- Petroleum industry and trade -- Security measures
- Petroleum industry and trade -- Security measures -- Iraq
- Petroleum industry and trade -- Security measures -- United States
- Petroleum reserves -- Security measures
- Petroleum reserves -- Security measures -- United States
- Pharmaceutical industry -- Security measures -- United States
- Pipelines -- Security measures -- Colombia
- Pipelines -- Security measures -- United States
- Pipelines -- Security measures | Law and legislation -- United States
- Pipelines -- Security measures | Law and legislation -- United States
- Planning, Cyberspace -- Security measures -- United States -- States
- Plum Island Animal Disease Center (U.S.) -- Security measures
- Plum Island Animal Disease Laboratory -- Security measures
- Pocket computers -- Security measures
- Police communication systems -- Security measures -- United States
- Political conventions -- Security measures -- United States -- Planning
- Port of Long Beach -- Security measures
- Port of Long Beach -- Security measures
- Port of Los Angeles -- Security measures
- Port of Los Angeles -- Security measures
- Portable computers -- Security measures -- United States
- Portland (Or.) -- Stores, shopping centers, etc. | Security measures
- Ports of entry -- Security measures -- Caribbean Area
- Ports of entry -- Security measures -- Florida | Miami
- Ports of entry -- Security measures -- Iraq
- Ports of entry -- Security measures -- Mexican-American Border Region
- Ports of entry -- Security measures -- Minnesota
- Ports of entry -- Security measures -- Northern boundary of the United States
- Ports of entry -- Security measures -- Texas | Houston
- Ports of entry -- Security measures -- United States
- Ports of entry -- Security measures -- United States
- Ports of entry -- Security measures -- United States
- Ports of entry -- Security measures -- United States -- Evaluation
- Ports of entry -- Security measures -- United States -- Finance
- Ports of entry -- Security measures -- United States -- Periodicals
- Ports of entry -- Security measures -- United States -- Planning
- Ports of entry -- Security measures | Economic aspects -- United States
- Ports of entry -- Security measures | Government policy -- United States
- Ports of entry -- Security measures | Technological innovations -- United States
- Post office buildings -- Security measures -- Michigan | Royal Oak
- Post office buildings -- Security measures -- Washington (D.C.)
- Post office buildings -- Security measures -- Washington (D.C.)
- Postal service -- Security measures -- United States
- Postal service -- Security measures -- United States
- Postal service -- Security measures -- United States -- Congresses
- Postwar reconstruction -- Security measures -- Afghanistan
- Power (Mechanics) -- United States -- Security measures
- Power resources -- Security measures -- United States
- Presidents -- Dwellings | Security measures -- Washington (D.C.)
- Prisons -- Security measures
- Prisons -- Security measures -- United States
- Private banks -- Security measures -- United States
- Private flying -- Security measures -- United States
- Public buildings -- Security measures
- Public buildings -- Security measures -- Georgia | Atlanta
- Public buildings -- Security measures -- Iraq
- Public buildings -- Security measures -- Ohio
- Public buildings -- Security measures -- United States
- Public buildings -- Security measures -- United States
- Public buildings -- Security measures -- United States -- Evaluation
- Public buildings -- Security measures -- United States -- Finance
- Public buildings -- Security measures -- United States -- Terminology -- Standards
- Public buildings -- Security measures -- Virginia | Roanoke -- Costs
- Public buildings -- Security measures -- Washington (D.C.)
- Public buildings -- Security measures | Standards -- United States
- Public buildings -- Security measures | Technological innovations -- United States
- Public buildings, American -- Security measures
- Public housing -- Security measures -- Illinois | Chicago
- Public housing -- Security measures -- Michigan | Detroit
- Public housing -- Security measures -- United States
- Public housing -- Security measures -- United States
- Public lands -- Security measures | Government policy -- Southwestern States
- Public lands -- Security measures | Government policy -- Southwestern States
- Public libraries -- Security measures -- United States
- Public records -- Security measures -- United States
- Public schools -- Security measures -- Pennsylvania
- truePublic schools -- Security measures -- United States
- Public utilities -- Security measures -- United States
- Radio frequency identification systems -- Security measures -- United States
- Radioactive substances -- Security measures -- Russia
- Radioactive substances -- Security measures -- United States
- Radioactive substances -- Security measures -- United States -- Evaluation
- Railroad trains -- Security measures -- United States
- Railroad trains -- Security measures -- United States
- Railroad travel -- Security measures -- Foreign countries
- Railroads -- Commuting traffic | Security measures -- United States
- Railroads -- Commuting traffic | Security measures -- United States
- Railroads -- Freight | Security measures -- United States
- Railroads -- Passenger traffic | Security measures
- Railroads -- Passenger traffic | Security measures -- New York (State) | New York
- Railroads -- Passenger traffic | Security measures -- United States
- Railroads -- Passenger traffic | Security measures -- United States
- Railroads -- Security measures
- Railroads -- Security measures -- New York Metropolitan Area
- Railroads -- Security measures -- United States
- Railroads -- Security measures -- United States
- Railroads -- Security measures -- United States -- Evaluation
- Railroads -- Security measures -- United States -- Finance
- Rare book libraries -- Security measures -- United States
- Reactor fuel reprocessing -- Security measures
- Records -- Security measures -- United States
- Rental housing -- Security measures -- United States
- Research, Industrial -- Security measures -- United States
- Retail trade -- Security measures
- Retail trade -- Security measures -- Handbooks, manuals, etc
- Retail trade -- Security measures -- United States
- Retail trade -- Security measures -- United States -- Bibliography
- Retail trade -- Security measures -- United States -- Congresses
- Retail trade -- United States -- Databases | Security measures
- Roads -- Security measures -- United States
- Roads -- Security measures -- United States
- Routers (Computer networks) -- Security measures | Standards -- United States
- Sandia National Laboratories -- Security measures
- School buildings -- Design and construction | Security measures
- Schools -- Security measures
- Schools -- Security measures
- Schools -- Security measures -- United States
- Securities industry -- Computer networks | Security measures -- United States
- Securities industry -- Computer networks | Security measures -- United States
- Securities industry -- Security measures | Government policy -- United States
- Sewage disposal plants -- Security measures -- United States
- Sewage disposal plants -- Security measures -- United States -- States | Finance
- Shipping -- Security measures
- Shipping -- Security measures -- Aden, Gulf of
- Shipping -- Security measures -- Florida | Tampa
- Shipping -- Security measures -- Horn of Africa
- Shipping -- Security measures -- Somalia
- Shipping -- Security measures -- United States
- Shipping -- Security measures -- United States
- Shipping -- Security measures -- United States
- Shipping -- Security measures -- United States -- Evaluation
- Shipping -- Security measures -- United States -- Finance
- Shipping -- Security measures -- United States -- Periodicals
- Shipping -- Security measures | Standards | International cooperation
- Ships -- Cargo | Security measures
- Ships -- Security measures -- United States
- Ships -- Security measures | International cooperation
- Small business -- Computer networks | Security measures
- Small business -- Computer networks | Security measures
- Small business -- Computer networks | Security measures -- United States
- Small business -- Computer networks | Security measures -- United States
- Small business -- Computer networks | Security measures -- United States -- Costs
- Small business -- Computer networks | Security measures -- United States -- Costs
- Small business -- Security measures
- Small business -- Security measures -- United States
- Small business -- United States -- Data processing | Security measures
- Smart power grids -- Security measures -- United States
- Smart power grids -- Security measures -- United States
- Software configuration management -- Security measures | Automation
- Software radio -- Security measures
- Stadiums -- Security measures -- New Jersey | East Rutherford
- Stock exchanges -- Security measures -- United States
- Stock exchanges -- United States -- Communication systems | Security measures
- Stock exchanges -- United States -- Data processing | Security measures
- Student aid -- Computer networks | Security measures -- United States
- Student aid -- Computer networks | Security measures -- United States
- Subways -- Security measures -- New York (State) | New York
- Subways -- Security measures -- Washington Metropolitan Area
- Super Bowl, 2014, East Rutherford, N.J. -- Security measures
- Supervisory control systems -- Security measures
- Supervisory control systems -- Security measures
- Supervisory control systems -- Security measures -- United States
- Supervisory control systems -- Security measures -- United States
- Tankers -- Security measures
- Tankers -- Security measures -- Texas | Houston
- Tankers -- Security measures -- United States
- Tax administration and procedure -- Security measures -- United States
- Tax refunds -- Security measures -- United States
- Tax returns -- Security measures -- United States -- Periodicals
- Tax returns -- United States -- Data processing | Security measures | Evaluation
- Tax returns -- United States -- Databases | Security measures
- Tax returns -- United States -- Databases | Security measures
- Technical publishing -- Security measures -- United States
- Telecommunication -- Security measures -- Databases
- Telecommunication -- Security measures -- United States
- Telecommunication -- Security measures | Government policy -- United States
- Telecommunication -- Security measures | Social aspects -- United States
- Telecommunication -- Technological innovations | Security measures -- United States
- Telecommunication systems -- Security measures
- Telecommunication systems -- Security measures -- United States
- Telecommunication systems -- Security measures | Government policy -- United States
- Telecommuting -- Security measures | Standards | Government policy -- United States
- Telephone -- Private branch exchanges | Security measures -- United States
- Terrorism -- Security measures
- Terrorism -- Security measures -- United States
- Testing laboratories -- Security measures -- United States
- Three Mile Island Nuclear Power Plant (Pa.) -- Security measures
- Tornadoes -- Security measures
- Tourism -- Security measures -- United States
- Tourism -- Security measures | Economic aspects -- United States
- Trans Union (U.S.) -- Computer networks | Security measures
- Trans Union (U.S.) -- Computer networks | Security measures
- Transborder data flow -- Security measures
- Transportation -- Passenger traffic | Security measures -- United States
- Transportation -- Security measures -- New York Metropolitan Area
- Transportation -- Security measures -- United States
- Transportation -- Security measures -- United States
- trueTransportation -- Security measures -- United States
- Transportation -- Security measures -- United States -- Evaluation
- Transportation -- Security measures -- United States -- Finance
- Transportation -- Security measures -- United States -- Finance
- Transportation -- Security measures -- United States -- Management
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>