Airports -- Security measuresSee also what's at your library, or elsewhere.
Broader terms:Narrower term: |
Filed under: Airports -- Security measures Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust) Antiterrorism Measures: The Adequacy of Foreign Airport Security: Staff Report to the Committee on Foreign Affairs, U.S. House of Representatives (Washington: GPO, 1986), by United States House Committee on Foreign Affairs (page images at HathiTrust) Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
Filed under: Airports -- Security measures -- United States
Filed under: Airports -- Security measures -- United States -- Evaluation
Items below (if any) are from related and broader terms.
Filed under: Airports
Filed under: Air traffic control -- Automation
Filed under: Air traffic control -- United States -- Automation
Filed under: Radar air traffic control systems -- Congresses
Filed under: Air traffic control -- Research -- United States Federal Research and Technology for Aviation (1994), by United States Congress Office of Technology Assessment
Filed under: Air traffic control -- United States -- Safety measures
Filed under: Airports -- United States -- Traffic controlFiled under: Airports -- Economic aspectsFiled under: Airports -- Finance
Filed under: Airports -- Government policy -- United States
Filed under: Airports -- Law and legislation -- United States International Terrorism, 1985: Hearings and Markup Before the Committee on Foreign Affairs and its Subcommittees on Arms Control, International Security, and Science, and on International Operations, House of Representatives, Ninety-Ninth Congress, Second Session, on H.R. 2822, March 5, 21, and June 25, 1985 (Washington: GPO, 1985), by United States House Committee on Foreign Affairs (page images at HathiTrust) Filed under: Airports -- ManagementFiled under: Airports -- United States
Filed under: Airports -- United States -- Periodicals
Filed under: Airports -- United States -- Statistics -- Periodicals
Filed under: Landing aids (Aeronautics) -- United States -- History -- 20th century
Filed under: Air bases, American
Filed under: Air bases, American -- England -- PeriodicalsFiled under: Air bases, American -- Security measures Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill Filed under: Landing aids (Aeronautics)
Filed under: Aeronautics -- Security measures -- United States -- EvaluationFiled under: Aeronautics, Commercial -- Security measures -- United States
Filed under: Aeronautics, Commercial -- Passenger traffic -- Security measures -- United StatesFiled under: Aeronautics, Commercial -- Security measures Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust) Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
Filed under: Command and control systems -- United States -- Security measures
Filed under: Computer networks -- Security measures Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide) The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP) Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at phptr.com)
Filed under: Cyberinfrastructure -- Security measures Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
Filed under: Dwellings -- Security measures
Filed under: Electronic data processing -- United States -- Security measuresFiled under: Electronic data processing departments -- Security measures Guidelines for Formal Verification Systems (1989), by Barbara Mayer and Monica Mcgill Lu (HTML at fas.org) Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1987), by National Computer Security Center (U.S.) (text at nist.gov) Trusted Product Evaluation Questionnaire (version 2, 1992), by National Computer Security Center (U.S.) (HTML at usmc.mil) Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) Trusted Network Interpretation Environments Guideline, by National Computer Security Center (U.S.) (HTML at fas.org)
More items available under broader and related terms at left. |