Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Security measures
A sample of Items that are about the Topic Security measures See All
Context
Context of Security measuresSubfocus of
No resources found
No enriched resources found
- 5G mobile communication systems -- Security measures -- United States
- 5G mobile communication systems -- Security measures -- United States -- Planning
- Administrative agencies -- Computer networks | Access control | Security measures
- Administrative agencies -- Computer networks | Security measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States -- Evaluation
- Administrative agencies -- Computer networks | Security measures | Research -- United States
- Administrative agencies -- Data processing | Access control | Security measures
- Administrative agencies -- Information resources management | Security measures -- United States
- Administrative agencies -- Information technology | Security measures -- United States
- Administrative agencies -- Security measures
- Administrative agencies -- Security measures -- United States
- Administrative agencies -- Security measures -- United States -- Evaluation
- Administrative agencies -- United States -- Communication systems | Security measures
- Administrative agencies -- United States -- Data processing | Security measures
- Administrative agencies -- United States -- Data processing | Security measures | Evaluation
- Aeronautics -- Security measures -- United States
- Aeronautics -- Security measures -- United States -- Management | Evaluation
- Aeronautics -- Security measures -- United States -- Planning
- Aeronautics -- Security measures | International cooperation
- Aeronautics, Commercial -- Computer networks | Security measures
- Aeronautics, Commercial -- Computer networks | Security measures -- European Union countries
- Aeronautics, Commercial -- Freight | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Passenger traffic | Security measures | Technological innovations -- United States -- Costs
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures -- California
- Aeronautics, Commercial -- Security measures -- California | Los Angeles
- Aeronautics, Commercial -- Security measures -- Chile
- Aeronautics, Commercial -- Security measures -- Cuba
- Aeronautics, Commercial -- Security measures -- European Union countries
- Aeronautics, Commercial -- Security measures -- Pacific Area
- Aeronautics, Commercial -- Security measures -- Problems, exercises, etc. | Interactive multimedia
- Aeronautics, Commercial -- Security measures -- United Arab Emirates | Abū Ẓaby (Emirate)
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States -- Congresses
- Aeronautics, Commercial -- Security measures -- United States -- Costs
- Aeronautics, Commercial -- Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Security measures -- United States -- Finance
- Aeronautics, Commercial -- Security measures -- United States -- Management
- Aeronautics, Commercial -- Security measures -- United States -- Planning
- Aeronautics, Commercial -- Security measures -- United States -- Testing
- Aeronautics, Commercial -- Security measures -- Virginia
- Aeronautics, Commercial -- Security measures -- Washington (D.C.)
- Aeronautics, Commercial -- Security measures -- Washington Metropolitan Area
- Aeronautics, Commercial -- Security measures | Equipment and supplies
- Aeronautics, Commercial -- Security measures | Evaluation
- Aeronautics, Commercial -- Security measures | Government policy -- United States
- Aeronautics, Commercial -- Security measures | International cooperation
- Aeronautics, Commercial -- Security measures | Law and legislation -- United States
- Aeronautics, Commercial -- Security measures | Research -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States -- Costs
- Aeronautics, Commercial -- United States -- Security measures
- Agriculture -- Security measures -- United States
- Agriculture -- Security measures -- United States -- Evaluation
- Air traffic control -- Computer networks | Security measures -- United States
- Airlines -- Security measures
- Airlines -- Security measures -- California
- Airlines -- Security measures -- United States
- Airlines -- Security measures -- United States -- Auditing
- Airlines -- Security measures -- United States -- Congresses
- Airlines -- Security measures -- United States -- Evaluation
- Airlines -- Security measures -- United States -- Finance
- Airlines -- Security measures | Government policy -- United States
- Airplanes -- Maintenance and repair | Security measures -- Foreign countries
- Airport buildings -- Security measures -- United States
- Airport buildings -- Security measures -- United States -- Legislative history
- Airports -- Baggage handling | Security measures
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu -- Evaluation
- Airports -- Baggage handling | Security measures -- United States
- Airports -- Baggage handling | Security measures -- United States -- Evaluation
- Airports -- Baggage handling | Security measures -- United States -- Finance
- Airports -- Baggage handling | Security measures -- United States -- Management
- Airports -- Baggage handling | Security measures | Government policy -- United States
- Airports -- Baggage handling | Security measures | International cooperation
- Airports -- Information technology | Security measures -- United States
- Airports -- Security measures
- Airports -- Security measures -- California | Los Angeles
- Airports -- Security measures -- California | Los Angeles -- Costs
- Airports -- Security measures -- California | Ontario -- Costs
- Airports -- Security measures -- Cuba
- Airports -- Security measures -- Florida | Orlando
- Airports -- Security measures -- New Jersey | Newark
- Airports -- Security measures -- United States
- Airports -- Security measures -- United States -- Congresses
- Airports -- Security measures -- United States -- Equipment and supplies
- Airports -- Security measures -- United States -- Evaluation
- Airports -- Security measures -- United States -- Finance
- Airports -- Security measures -- United States -- Management
- Airports -- Security measures -- United States -- Testing
- Airports -- Security measures -- Washington Metropolitan Area
- Airports -- Security measures | International cooperation
- Airports -- Security measures | Technological innovations -- United States
- Airports -- Security measures | Technological innovations -- United States -- Costs
- Airports -- United States -- Security measures
- Airways -- Security measures -- United States
- Alternate Joint Communications Center (U.S.) -- Security measures
- Ammonium nitrate -- Security measures -- United States
- Ammunition -- Security measures -- Congresses
- Animal industry -- Security measures -- United States
- Application software -- Security measures -- United States
- Archives -- Security measures -- Handbooks, manuals, etc
- Archives -- Security measures -- United States
- Armed Forces -- Security measures
- Arsenals -- Security measures -- United States
- Artificial satellites -- Security measures -- United States
- Automated tellers -- Security measures
- Automatic data collection systems -- Security measures -- United States
- Automobiles -- Radio equipment | Security measures -- United States
- Ballot -- Georgia -- Security measures -- Cases
- Ballot -- Security measures -- Georgia
- Ballot -- Security measures -- United States
- Ballot -- Security measures -- United States -- Finance
- Banks and banking -- Security measures
- Banks and banking -- Security measures
- Banks and banking -- Security measures -- United States
- Biological warfare -- Security measures -- United States
- Border patrols -- Security measures -- United States
- Borderlands -- Security measures
- Borderlands -- Security measures -- United States
- Borderlands -- Security measures | Government policy -- Southwestern States
- Bridges -- Security measures -- New York Metropolitan Area
- Broadband communication systems -- Security measures -- United States
- Building leases -- Security measures -- United States
- Buildings -- Security measures -- United States
- Bus industry -- Security measures -- United States -- Finance
- Bus lines -- Security measures -- United States
- Bus lines -- Security measures -- United States -- Finance
- Buses -- Security measures -- United States
- Buses -- Security measures -- United States -- Evaluation
- Buses -- Security measures -- United States -- Finance
- Business -- Data processing | Security measures
- Business communication -- Security measures -- United States -- States
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures -- Congresses
- Business enterprises -- Computer networks | Security measures -- Germany
- Business enterprises -- Computer networks | Security measures -- United States
- Business enterprises -- Security measures
- Business enterprises -- Security measures -- United States
- Business enterprises -- Security measures -- United States -- Planning
- Business intelligence -- Security measures
- Business intelligence -- Security measures
- Business intelligence -- Security measures -- United States -- Handbooks, manuals, etc
- Business logistics -- Security measures
- Business logistics -- Security measures -- United States -- Evaluation
- Capital market -- Security measures -- United States
- Cargo handling -- Security measures -- Canada
- Cargo handling -- Security measures -- United States
- Cargo handling -- Security measures | International cooperation
- Cargo holds -- Security measures | Government policy -- United States
- Cell phone systems -- Security measures -- United States
- Cell phones -- Security measures -- United States
- Chemical industry -- Security measures -- United States
- Chemical industry -- Security measures | Government policy -- United States
- Chemical plants -- Security measures -- New Jersey
- Chemical plants -- Security measures -- United States
- Chemical plants -- Security measures | Government policy -- United States
- Chemical warfare -- Security measures -- United States
- Chicago O'Hare International Airport -- Security measures | Evaluation
- Cloud computing -- Security measures
- Cloud computing -- Security measures -- United States
- Cloud computing -- Security measures -- United States -- Congresses
- Coasts -- Security measures -- United States
- Cole (Ship) -- Security measures
- Command and control systems -- Security measures -- United States
- Commercial vehicle industry -- Security measures -- United States
- Communication -- Security measures -- United States
- Communications, Military -- Security measures -- United States
- Computer crimes -- Security measures -- United States
- Computer networks -- Remote access | Security measures -- United States
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Europe -- Congresses
- Computer networks -- Security measures -- Germany
- Computer networks -- Security measures -- Handbooks, manuals, etc
- Computer networks -- Security measures -- Korea (South)
- Computer networks -- Security measures -- Periodicals
- Computer networks -- Security measures -- Poland
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States -- Congresses
- Computer networks -- Security measures -- United States -- Evaluation
- Computer networks -- Security measures -- United States -- Finance
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures -- United States -- States
- Computer networks -- Security measures | Auditing
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | International cooperation
- Computer networks -- Security measures | International cooperation -- Congresses
- Computer networks -- Security measures | Law and legislation -- United States
- Computer networks -- Security measures | Research -- United States
- Computer networks -- Security measures | Research -- United States -- Finance
- Computer networks -- Security measures | Social aspects
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Technological innovations -- United States
- Computer software -- Security measures -- United States
- Computer viruses -- Security measures -- United States
- Confidential communications -- Taxation | Security measures -- United States -- Periodicals
- Container ships -- Security measures -- United States
- Container ships -- Security measures -- United States -- Evaluation
- Container terminals -- Security measures
- Container terminals -- Security measures -- California
- Container terminals -- Security measures -- United States
- Container terminals -- Security measures -- United States -- Evaluation
- Containerization -- Security measures -- Foreign countries
- Containerization -- Security measures -- United States
- Containerization -- Security measures | Technological innovations | Evaluation
- Containers -- Security measures
- Containers -- Security measures -- United States
- Containers -- Security measures | Technological innovations | Evaluation
- Copying machines -- Security measures
- Corporations -- Security measures
- Corporations -- Security measures
- Corporations -- Security measures -- Handbooks, manuals, etc
- Corporations -- Security measures -- United States
- Corporations -- Security measures -- United States -- Planning
- Correctional institutions -- Security measures -- United States
- Courthouses -- Security measures
- Courthouses -- Security measures -- California | Los Angeles
- Courthouses -- Security measures -- United States
- Courthouses -- Security measures -- United States -- Costs
- Courthouses -- Security measures -- United States -- States
- Credit bureaus -- Computer networks | Security measures -- United States
- Credit cards -- Security measures -- United States
- Credit cards -- Security measures -- United States -- Congresses
- Credit cards -- Security measures | Standards -- United States -- Congresses
- Credit cards -- Security measures | Standards -- United States -- Evaluation
- Crowds -- Security measures -- New Jersey -- Planning
- Crowds -- Security measures -- United States
- Cruise lines -- Security measures
- Cruise lines -- Security measures | Evaluation
- Cruise ships -- Security measures
- Cruise ships -- Security measures -- United States
- Cruise ships -- Security measures | Evaluation
- Cryptocurrencies -- Security measures -- United States
- Customs inspection -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures -- Case studies
- Cyberinfrastructure -- Security measures -- Congresses
- Cyberinfrastructure -- Security measures -- Europe
- Cyberinfrastructure -- Security measures -- United States
- Cyberinfrastructure -- Security measures -- United States -- Congresses
- Cyberinfrastructure -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures -- United States -- Finance
- Cyberinfrastructure -- Security measures -- United States -- States
- Cyberinfrastructure -- Security measures | Government policy -- Ukraine
- Cyberinfrastructure -- Security measures | Government policy -- United States
- Cyberinfrastructure -- Security measures | Law and legislation | Economic aspects -- United States
- Cyberinfrastructure -- Security measures | Research -- United States
- Cyberinfrastructure -- Security measures | Technological innovations -- United States
- Cyberspace -- Security measures
- Cyberspace -- Security measures -- Congresses
- Cyberspace -- Security measures -- Texas -- Planning
- Cyberspace -- Security measures -- United States
- Cyberspace -- Security measures -- United States -- Congresses
- Cyberspace -- Security measures -- United States -- Handbooks, manuals, etc
- Cyberspace -- Security measures -- United States -- Management
- Cyberspace -- Security measures -- United States -- Planning
- Cyberspace -- Security measures -- United States -- States | Planning
- Cyberspace -- Security measures | Government policy
- Cyberspace -- Security measures | Government policy -- United States
- Cyberspace -- Security measures | International cooperation
- Cyberspace -- Security measures | Law and legislation -- United States
- Cyberspace -- Security measures | Research -- United States
- Cyberterrorism -- Security measures -- United States
- Dams -- Security measures -- United States
- Data protection -- Security measures
- Data protection -- Security measures -- United States
- Defense contracts -- Data processing | Security measures -- United States
- Defense industries -- Security measures
- Defense industries -- Security measures -- United States -- Evaluation
- Defense industries -- Security measures -- United States -- Periodicals
- Defense information, Classified -- Security measures -- United States -- Evaluation
- Defense information, Classified -- Security measures | International cooperation
- Detector dogs -- Transportation | Security measures
- Digital communications -- Security measures
- Diplomatic and consular service -- Security measures -- United States
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures -- Iraq
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya | Banghāzī
- Diplomatic and consular service, American -- Buildings | Security measures -- Yemen (Republic)
- Diplomatic and consular service, American -- Buildings | Security measures | Law and legislation
- Diplomatic and consular service, American -- Buildings | Security measures | Law and legislation
- Diplomatic and consular service, American -- Gabon -- Buildings | Security measures
- Diplomatic and consular service, American -- Libya | Banghāzī -- Buildings | Security measures
- Diplomatic and consular service, American -- Security measures
- Directory services (Computer network technology) -- Security measures -- United States
- Drinking water -- Security measures -- United States -- Finance
- Drinking water -- Security measures | Government policy -- United States
- Drivers' licenses -- Security measures -- United States
- Dwellings -- Security measures
- Dwellings -- Security measures
- Dwellings -- Security measures -- Congresses
- Economic development projects -- Security measures -- Afghanistan
- Elections -- Computer networks | Security measures -- United States
- Elections -- Equipment and supplies | Security measures -- Georgia
- Elections -- Equipment and supplies | Security measures -- United States -- Finance
- Elections -- Security measures -- Georgia
- Elections -- Security measures -- United States
- Elections -- Security measures -- United States -- Finance
- Elections -- Security measures -- United States -- Funding
- Elections -- United States -- Equipment and supplies | Security measures
- Electric power distribution -- Security measures -- United States
- Electric power distribution -- Security measures | Research -- United States
- Electric power systems -- Security measures -- United States
- Electric power systems -- Security measures -- United States -- Evaluation
- Electric power transmission -- Security measures -- United States
- Electric utilities -- Security measures
- Electric utilities -- Security measures -- Pennsylvania
- Electric utilities -- Security measures -- United States
- Electric utilities -- Security measures | Government policy -- United States
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures -- Australia
- Electronic commerce -- Security measures -- Congresses
- Electronic commerce -- Security measures -- Great Britain
- Electronic commerce -- Security measures -- United States
- Electronic commerce -- United States -- Security measures | Public opinion
- Electronic data interchange -- Security measures -- Germany
- Electronic data interchange -- Security measures -- United States
- Electronic data processing -- Security measures -- United States
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures -- Bibliography
- Electronic data processing departments -- Security measures -- Congresses
- Electronic data processing departments -- Security measures -- Directories
- Electronic data processing departments -- Security measures -- Handbooks, manuals, etc
- Electronic data processing departments -- Security measures -- Periodicals
- Electronic data processing departments -- Security measures -- United States
- Electronic filing of tax returns -- Security measures -- United States
- Electronic filing systems -- Security measures -- United States
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures -- Austria
- Electronic funds transfers -- Security measures -- United States -- Congresses
- Electronic funds transfers -- Security measures | Law and legislation
- Electronic funds transfers -- United States -- Security measures
- Electronic government information -- Security measures -- United States
- Electronic government information -- Security measures -- United States -- Evaluation
- Electronic government information -- Security measures -- United States -- Periodicals
- Electronic information resources -- Security measures -- Periodicals
- Electronic mail systems -- Security measures -- United States
- Electronic mail systems -- Security measures -- United States
- Electronic mail systems -- Security measures | Data processing
- Electronic records -- Security measures -- United States
- Electronic records -- Security measures | Government policy -- United States
- Electronic systems -- Law and legislation | Security measures
- Electronic systems -- Law and legislation | Security measures -- United States
- Electronic systems -- Security measures -- United States
- Electronic voting -- Computer networks | Security measures -- United States
- Electronic voting -- Security measures -- Germany
- Electronic voting -- Security measures -- Illinois
- Electronic voting -- Security measures -- United States
- Embassy buildings -- Security measures
- Embassy buildings -- Security measures -- Afghanistan
- Embassy buildings -- Security measures -- Central African Republic
- Embassy buildings -- Security measures -- Congo (Democratic Republic)
- Embassy buildings -- Security measures -- England | London
- Embassy buildings -- Security measures -- Iraq
- Embassy buildings -- Security measures -- Mexico
- Embassy buildings -- Security measures -- United States
- Embassy buildings -- Security measures -- United States
- Embassy buildings -- Security measures -- United States -- Costs
- Embassy buildings -- Security measures -- United States -- Evaluation
- Embassy buildings -- Security measures -- United States -- Finance
- Embassy buildings -- Security measures | Law and legislation
- Emigration and immigration -- Security measures -- United States
- Energy industries -- Security measures
- Energy industries -- Security measures -- Europe -- Congresses
- Equifax, Inc. -- Computer networks | Security measures
- Executive Office for U.S. Attorneys -- Information technology | Security measures
- Executive departments -- Computer networks | Security measures -- United States
- Executive departments -- Information resource management | Security measures -- United States
- Executive departments -- Information resources management | Security measures -- United States
- Executive departments -- United States -- Data processing | Security measures
- Experian (Firm) -- Computer networks | Security measures
- Explosives industry -- Security measures -- United States
- Federal Deposit Insurance Corporation -- Computer networks | Security measures
- Federal Deposit Insurance Corporation -- Information technology | Security measures
- Federal Reserve banks -- Information technology | Security measures
- Federal Reserve banks -- Security measures
- Ferries -- Security measures -- United States
- Financial institutions -- Computer networks | Security measures -- United States
- Financial institutions -- Computer networks | Security measures | Government policy -- United States
- Financial institutions -- Security measures -- United States
- Financial institutions -- Security measures -- United States -- Congresses
- Financial services industry -- Computer networks | Security measures -- United States
- Financial services industry -- Databases | Security measures -- United States
- Financial services industry -- Security measures -- United States
- Financial services industry -- Security measures -- United States -- Congresses
- Firearms -- Security measures -- United States
- Flight training -- Security measures | Government policy -- United States
- Food industry and trade -- Security measures -- United States
- Food industry and trade -- Security measures | Government policy -- United States
- Food relief -- Security measures -- United States
- Food supply -- Security measures
- Food supply -- Security measures -- United States -- Evaluation
- Food supply -- Security measures | Government policy -- United States
- Food supply -- United States -- Security measures
- Freight and freightage -- Security measures -- Foreign countries
- Freight and freightage -- Security measures -- United States
- Freight and freightage -- Security measures -- United States -- Evaluation
- Freight and freightage -- Security measures -- United States -- Finance
- Gasoline supply -- Security measures -- United States
- Global Positioning System -- Security measures | Data processing
- Global system for mobile communications -- Security measures -- United States
- Government Web sites -- Security measures -- United States
- Government communication systems -- Security measures -- United States
- Government information -- Computer networks | Security measures -- United States
- Government information -- Data processing | Security measures -- United States
- Government information -- Security measures -- United States
- Government property -- Security measures
- Government property -- Security measures -- United States
- Government property -- Security measures -- United States -- Evaluation
- Government property -- Security measures | Standards -- United States
- Government purchasing -- Security measures -- United States
- Green cards -- Security measures | Evaluation
- Harbors -- Security measures
- Harbors -- Security measures -- Baltic Sea Region -- Congresses
- Harbors -- Security measures -- California
- Harbors -- Security measures -- California | Long Beach
- Harbors -- Security measures -- California | Los Angeles
- Harbors -- Security measures -- Caribbean Area
- Harbors -- Security measures -- Florida
- Harbors -- Security measures -- Florida | Miami
- Harbors -- Security measures -- Florida | Tampa
- Harbors -- Security measures -- Louisiana | New Orleans
- Harbors -- Security measures -- New York (State) | New York
- Harbors -- Security measures -- Northwest, Pacific
- Harbors -- Security measures -- Oregon
- Harbors -- Security measures -- South Carolina
- Harbors -- Security measures -- Sweden
- Harbors -- Security measures -- Texas | Houston
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States -- Evaluation
- Harbors -- Security measures -- United States -- Finance
- Harbors -- Security measures -- Virginia
- Harbors -- Security measures -- Washington (State)
- Hazardous substances -- Security measures -- United States
- Hazardous substances -- Transportation | Security measures -- United States
- Hazardous waste sites -- Security measures -- United States
- Health insurance exchanges -- Security measures -- United States
- High school buildings -- Florida | Broward County -- Security measures
- Highly enriched uranium -- Security measures
- Highly enriched uranium -- Security measures | Evaluation
- Home computer networks -- Security measures -- United States
- Honolulu International Airport -- Security measures | Evaluation
- Hosting of sporting events -- Security measures -- United States
- Hydroelectric power plants -- Security measures -- United States
- Hydroelectric power plants -- Security measures -- United States -- Finance
- Identification cards -- Security measures -- United States
- Identification cards -- Security measures -- United States -- Evaluation
- Industrial buildings -- Security measures -- United States
- Industries -- Security measures
- Industries -- Security measures
- Industries -- Security measures -- United States
- Industries -- Security measures -- United States
- Industries -- Security measures -- United States -- Auditing
- Industries -- Security measures -- United States -- Congresses
- Industries -- Security measures -- United States -- Forms
- Industries -- Security measures -- United States -- Handbooks, manuals, etc
- Industries -- Security measures -- United States -- Planning
- Information networks -- Security measures -- United States
- Information networks -- Security measures | Government policy -- United States
- Information resources management -- Security measures -- United States
- Information services industry -- Security measures -- Handbooks, manuals, etc
- Information storage and retrieval systems -- Finance | Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures
- Information storage and retrieval systems -- Security measures -- United States
- Information storage and retrieval systems -- Security measures -- United States -- Evaluation
- Information storage and retrieval systems -- Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures | Management
- Information storage and retrieval systems -- Telecommunication | Security measures -- United States
- Information storage and retrieval systems -- United States | Security measures
- Information storage and retrieval systems -- United States | Security measures -- United States
- Information storage and retrieval systems -- United States | Security measures | Evaluation
- Information storage and retrieval systems -- United States | Security measures | Government policy
- Information storage and retrieval systems -- United States | Security measures | Government policy -- United States
- Information storage and retrieval systems -- United States | Security measures | Management
- Information superhighway -- Security measures
- Information superhighway -- Security measures -- Congresses
- Information superhighway -- Security measures -- United States
- Information superhighway -- Security measures | Government policy -- United States
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures -- California | Laguna Niguel -- Evaluation
- Information technology -- Security measures -- Congresses
- Information technology -- Security measures -- Cross-cultural studies
- Information technology -- Security measures -- Idaho | Pocatello
- Information technology -- Security measures -- United States -- Auditing
- Information technology -- Security measures | Government policy -- United States
- Information technology -- United States -- Security measures
- Infrastructure (Economics) -- Computer networks | Security measures -- United States
- Infrastructure (Economics) -- Security measures -- United States
- Infrastructure (Economics) -- Security measures -- United States -- Planning
- Infrastructure (Economics) -- Security measures | Government policy -- United States
- Infrastructure (Economics) -- United States -- Data processing | Security measures
- Inland navigation -- Security measures -- United States
- Insurance exchanges -- Security measures -- United States
- Intelligence service -- Security measures -- United States -- Auditing -- Periodicals
- Intelligence service -- Security measures -- United States -- Evaluation
- Intelligence service -- Security measures -- United States -- Evaluation -- Periodicals
- Interagency coordination -- Security measures
- International airports -- Security measures
- International airports -- Security measures | Evaluation
- International airports -- Security measures | International cooperation
- International business enterprises -- Security measures
- International business enterprises -- Security measures -- Congresses
- International business enterprises -- Security measures -- United States
- International business enterprises -- Security measures -- United States -- Handbooks, manuals, etc
- International trade -- Security measures
- International travel -- Security measures -- United States
- International travel regulations -- Security measures -- United States
- Internet -- Security measures
- Internet -- Security measures
- Internet -- Security measures
- Internet -- Security measures -- Asia
- Internet -- Security measures -- Congresses
- Internet -- Security measures -- European Union countries -- Congresses
- Internet -- Security measures -- United States
- Internet -- Security measures -- United States -- Congresses
- Internet -- Security measures | Government policy
- Internet -- Security measures | Government policy -- European Union countries
- Internet -- Security measures | Government policy -- United States
- Internet -- Security measures | Government policy -- United States -- Evaluation
- Internet -- Security measures | Research -- United States
- Internet and children -- Security measures -- Pennsylvania
- Internet and children -- Security measures -- United States
- Internet auctions -- Security measures -- United States
- Internet in medicine -- Security measures -- United States
- Internet in political campaigns -- Security measures -- United States
- Internet industry -- Security measures
- Internet of things -- Security measures -- United States
- Internet service providers -- Security measures -- United States
- Internet telephony -- Security measures -- United States
- Investments, Chinese -- Security measures
- Investments, Foreign -- Security measures -- United States
- Job Corps (U.S.) -- Security measures
- John F. Kennedy International Airport -- Security measures | Auditing
- Justice, Administration of -- Data processing | Security measures -- United States
- Laboratories -- Security measures -- United States
- Laptop computers -- Security measures
- Laptop computers -- Security measures -- United States
- Law enforcement -- Security measures -- United States
- Law offices -- Computer networks | Security measures -- United States
- Lawrence Livermore National Laboratory -- Security measures
- Libraries -- Security measures
- Libraries -- Security measures
- Libraries -- Security measures -- Congresses
- Libraries -- Security measures -- Handbooks, manuals, etc
- Libraries -- Special collections | Security measures -- Handbooks, manuals, etc
- Liquefied gases -- Transportation | Security measures
- Liquefied gases -- Transportation | Security measures -- United States
- Liquefied natural gas shipping terminals -- Security measures -- Long Island Sound (N.Y. and Conn.)
- Liquefied natural gas shipping terminals -- Security measures -- Maryland | Baltimore County
- Local area networks (Computer networks) -- Security measures -- United States
- Local government -- Computer networks | Security measures -- United States
- Local transit -- Security measures -- New Jersey -- Finance
- Local transit -- Security measures -- New York (State) | New York
- Local transit -- Security measures -- New York (State) | New York -- Finance
- Local transit -- Security measures -- United States
- Local transit -- Security measures -- United States -- Evaluation
- Local transit -- Security measures -- United States -- Examinations, questions, etc
- Local transit -- Security measures -- United States -- Finance
- Local transit -- Security measures -- Washington Metropolitan Area
- Local transit -- Security measures | Government policy -- United States
- Local transit -- Security measures | Technological innovations -- United States
- Logan International Airport -- Security measures -- United States
- Los Alamos National Laboratory -- Security measures
- Los Alamos Scientific Laboratory -- Security measures
- Luggage -- Security measures -- United States
- Marine terminals -- Security measures
- Marine terminals -- Security measures -- California
- Marine terminals -- Security measures -- California | Long Beach
- Marine terminals -- Security measures -- California | Los Angeles
- Marine terminals -- Security measures -- Florida
- Marine terminals -- Security measures -- Louisiana | New Orleans
- Marine terminals -- Security measures -- New York (State) | New York
- Marine terminals -- Security measures -- Northwest, Pacific
- Marine terminals -- Security measures -- Oregon
- Marine terminals -- Security measures -- United States
- Marine terminals -- Security measures -- United States
- Marine terminals -- Security measures -- Washington (State)
- Medical care -- Information technology | Security measures
- Medical care -- Information technology | Security measures -- Congresses
- Medical informatics -- Security measures -- United States
- Medical informatics -- Security measures | Government policy -- United States
- Medical laboratories -- Security measures -- United States
- Medical records -- Data processing | Security measures
- Medical records -- Security measures -- United States
- Merchant marine -- Security measures
- Merchant marine -- Security measures -- United States
- Metropolitan areas -- Security measures -- United States -- Finance
- Mexican-American Border Region -- Security measures
- Microbiological laboratories -- Security measures -- United States
- Microcomputers -- Security measures
- Microcomputers -- Security measures -- United States
- Military bases -- Security measures -- United States
- Military bases, American -- Security measures
- Military bases, American -- Security measures -- Middle East
- Military bases, American -- Security measures -- Turkey
- Military research -- Security measures -- United States
- Mobile commerce -- Security measures -- Austria
- Mobile communication systems -- Security measures -- United States
- Mobile computing -- Security measures -- United States
- Monuments -- Security measures -- United States
- Monuments -- Security measures -- Washington (D.C.)
- Multimedia systems -- Security measures
- Museum buildings -- Security measures -- Washington (D.C.)
- National Airspace System (U.S.) -- Security measures
- National Finance Center (U.S.) -- Security measures
- National Institute of Standards and Technology (U.S.) -- Buildings | Security measures
- National Institute of Standards and Technology (U.S.) -- Security measures
- National parks and reserves -- Security measures -- United States
- Natural gas -- Storage | Security measures -- United States
- Natural gas pipelines -- Security measures
- Natural gas pipelines -- Security measures -- United States
- Network computers -- Security measures -- United States
- Network-centric operations (Military science) -- Security measures -- Germany
- Network-centric operations (Military science) -- Security measures -- Korea (South)
- Network-centric operations (Military science) -- Security measures -- Poland
- Network-centric operations (Military science) -- Security measures -- United States
- Network-centric operations (Military science) -- Security measures | Government policy -- Singapore
- Network-centric operations (Military science) -- Security measures | Government policy -- United States
- New York (State), Metropolitan Transportation Authority -- Security measures | Costs | Auditing
- Non-governmental organizations -- Security measures
- Nonprofit organizations -- Security measures -- United States
- Nonprofit organizations -- Security measures -- United States -- Finance
- Northern Illinois Railroad Company -- Security measures | Costs | Auditing
- Nuclear energy -- Research | Laboratories | Security measures
- Nuclear energy -- Research | Laboratories | Security measures -- New Mexico | Los Alamos
- Nuclear energy -- Research | Laboratories | Security measures -- United States
- Nuclear energy -- Security measures
- Nuclear energy -- Security measures -- Congresses
- Nuclear energy -- Technological innovations | Security measures
- Nuclear facilities -- Security measures
- Nuclear facilities -- Security measures -- California
- Nuclear facilities -- Security measures -- Congresses
- Nuclear facilities -- Security measures -- Former Soviet republics
- Nuclear facilities -- Security measures -- Russia (Federation)
- Nuclear facilities -- Security measures -- United States
- Nuclear facilities -- Security measures -- United States
- Nuclear facilities -- Security measures -- United States -- Evaluation
- Nuclear facilities -- Security measures -- United States -- Finance
- Nuclear facilities -- Security measures | Evaluation
- Nuclear facilities -- Security measures | Government policy -- United States
- Nuclear facilities -- Security measures | International cooperation
- Nuclear facilities -- Security measures | International cooperation -- Examinations, questions, etc
- Nuclear facilities -- Security measures | Standards -- United States
- Nuclear fuel elements -- Security measures
- Nuclear fuels -- Security measures
- Nuclear fuels -- Security measures | International cooperation
- Nuclear industry -- Security measures
- Nuclear industry -- Security measures
- Nuclear industry -- Security measures -- Former Soviet republics
- Nuclear industry -- Security measures -- Russia (Federation)
- Nuclear industry -- Security measures -- United States -- Evaluation
- Nuclear industry -- United States -- Security measures
- Nuclear power plants -- Security measures
- Nuclear power plants -- Security measures -- United States
- Nuclear power plants -- Security measures -- United States -- Auditing
- Nuclear power plants -- United States -- Design and construction | Security measures | Auditing
- Nuclear reactors -- Security measures -- United States
- Nuclear weapons -- Security measures -- United States
- Nuclear weapons -- Security measures | Evaluation
- Nuclear weapons industry -- Security measures -- United States
- Nuclear weapons plants -- Security measures
- Nuclear weapons plants -- Security measures -- New Mexico | Los Alamos
- Nuclear weapons plants -- Security measures -- United States
- Nuclear weapons plants -- Security measures | Standards -- United States
- Office buildings -- Security measures -- Washington (D.C.) -- Periodicals
- Office equipment and supplies -- Security measures
- Offshore gas industry -- Security measures
- Offshore structures -- Security measures -- United States
- Offshore structures -- Security measures | International cooperation
- Olympic Games, 1996, Atlanta, Ga. -- Security measures
- Olympic Games, 2004, Athens, Greece -- Security measures
- Olympic Winter Games, 2010, Vancouver, B.C. -- Security measures
- Olympics -- Security measures
- Olympics -- Security measures -- United States -- Planning
- Online databases -- Security measures -- United States
- Online social networks -- Security measures
- Online social networks -- Security measures -- United States
- Outer space -- Exploration | Security measures
- Passenger ships -- Security measures
- Passenger ships -- Security measures | International cooperation
- Passenger trains -- Security measures -- United States
- Passenger trains -- Security measures -- United States -- Finance
- Peace Corps (U.S.) -- Security measures
- Peace Corps (U.S.) -- Security measures | Evaluation
- Personal information management -- Security measures -- United States
- Petroleum -- Transportation | Security measures -- Texas | Houston
- Petroleum industry and trade -- Security measures
- Petroleum industry and trade -- Security measures -- United States
- Petroleum pipelines -- Security measures
- Petroleum reserves -- Security measures
- Pharmaceutical industry -- Security measures -- United States
- Pipelines -- Security measures -- Colombia
- Pipelines -- Security measures -- United States
- Pipelines -- Security measures | Law and legislation -- United States
- Plum Island Animal Disease Center (U.S.) -- Security measures
- Plum Island Animal Disease Laboratory -- Security measures -- United States
- Political conventions -- Security measures -- United States -- Planning
- Polling places -- Security measures -- United States
- Portable computers -- Security measures -- United States
- Portable databases -- Security measures
- Ports of entry -- Security measures -- Florida | Miami
- Ports of entry -- Security measures -- Mexican-American Border Region
- Ports of entry -- Security measures -- Minnesota
- Ports of entry -- Security measures -- Northern boundary of the United States
- Ports of entry -- Security measures -- Texas | Houston
- Ports of entry -- Security measures -- United States
- Ports of entry -- Security measures -- United States -- Evaluation
- Ports of entry -- Security measures -- United States -- Finance
- Ports of entry -- Security measures -- United States -- Periodicals
- Ports of entry -- Security measures -- United States -- Planning
- Ports of entry -- Security measures | Economic aspects -- United States
- Ports of entry -- Security measures | Government policy -- United States
- Ports of entry -- Security measures | Technological innovations -- United States
- Ports of entry -- United States -- Security measures
- Post office buildings -- Security measures -- Washington (D.C.)
- Postal service -- Michigan | Royal Oak -- Buildings | Security measures
- Postal service -- Security measures -- United States
- Postwar reconstruction -- Security measures -- Afghanistan
- Presidents -- Dwellings | Security measures -- Washington (D.C.)
- Presidents -- Security measures -- United States
- Prisons -- Security measures
- Prisons -- Security measures -- United States
- Private flying -- Security measures -- United States
- Private flying -- Security measures -- Washington Metropolitan Area
- Public buildings -- Georgia | Atlanta -- Security measures
- Public buildings -- Security measures -- Michigan | Detroit
- Public buildings -- Security measures -- United States
- Public buildings -- Security measures -- United States -- Evaluation
- Public buildings -- Security measures -- United States -- Finance
- Public buildings -- Security measures -- United States -- Legislative history
- Public buildings -- Security measures -- Virginia | Roanoke -- Costs
- Public buildings -- Security measures -- Washington (D.C.)
- Public buildings -- Security measures -- Washington (D.C.) -- Periodicals
- Public buildings -- Security measures | Standards -- United States
- Public buildings -- Security measures | Technological innovations -- United States
- Public housing -- Security measures -- Illinois | Chicago
- Public housing -- Security measures -- United States
- Public lands -- Security measures | Government policy -- Southwestern States
- Public records -- Security measures -- United States
- Public schools -- Security measures -- Pennsylvania
- Public schools -- Security measures -- United States
- Public schools -- Security measures -- United States -- Statistics
- Public works -- Security measures -- United States
- Radio frequency identification systems -- Security measures -- United States
- Radioactive substances -- Security measures -- Iraq
- Radioactive substances -- Security measures -- United States
- Radioactive substances -- Security measures -- United States -- Evaluation
- Radioactive substances -- Security measures | Evaluation
- Railroad stations -- Security measures -- United States
- Railroad trains -- Security measures -- United States
- Railroad travel -- Security measures -- Foreign countries
- Railroads -- Commuting traffic | Security measures -- United States
- Railroads -- Freight | Security measures -- United States
- Railroads -- Passenger traffic | Security measures
- Railroads -- Passenger traffic | Security measures -- New York (State) | New York
- Railroads -- Passenger traffic | Security measures -- United States
- Railroads -- Security measures
- Railroads -- Security measures -- New York (State) -- Costs | Auditing
- Railroads -- Security measures -- New York Metropolitan Area
- Railroads -- Security measures -- United States
- Railroads -- Security measures -- United States -- Evaluation
- Railroads -- Security measures -- United States -- Finance
- Railroads -- Security measures -- Washington (D.C.) -- Costs | Auditing
- Reactor fuel reprocessing -- Security measures
- Records -- Security measures -- United States
- Rental libraries -- Security measures -- Handbooks, manuals, etc
- Research and development projects -- Security measures -- United States
- Research, Industrial -- Security measures -- United States
- Retail trade -- Databases | Security measures -- United States
- Retail trade -- Security measures -- Bibliography
- Retail trade -- Security measures -- United States
- Roads -- Security measures -- United States
- Ronald Reagan Washington National Airport -- Security measures | Evaluation
- Routing (Computer network management) -- Equipment and supplies | Security measures
- SENTRY (Information retrieval system) -- Security measures
- Sandia National Laboratories -- Security measures
- School buildings -- Security measures -- United States
- Schools -- Security measures
- Schools -- Security measures -- United States
- Schools -- Security measures -- United States -- Handbooks, manuals, etc
- Securities industry -- Computer networks | Security measures -- United States
- Securities industry -- Security measures | Government policy -- United States
- Sewage disposal plants -- Security measures -- United States
- Sewage disposal plants -- Security measures -- United States -- States | Finance
- Shipment of goods -- Security measures | Technological innovations | Evaluation
- Shipping -- Security measures
- Shipping -- Security measures
- Shipping -- Security measures
- Shipping -- Security measures -- Aden, Gulf of
- Shipping -- Security measures -- Caribbean Area
- Shipping -- Security measures -- Congresses
- Shipping -- Security measures -- Florida | Tampa
- Shipping -- Security measures -- Horn of Africa
- Shipping -- Security measures -- India
- Shipping -- Security measures -- Somalia
- Shipping -- Security measures -- Sweden
- Shipping -- Security measures -- United States
- Shipping -- Security measures -- United States
- Shipping -- Security measures -- United States -- Evaluation
- Shipping -- Security measures -- United States -- Finance
- Shipping -- Security measures | International cooperation
- Shipping -- Security measures | Standards | International cooperation
- Ships -- Cargo | Security measures -- United States -- Evaluation
- Ships -- Security measures -- United States
- Ships -- Security measures | International cooperation
- Shopping centers -- Oregon | Portland -- Security measures
- Small business -- Computer networks | Security measures
- Small business -- Computer networks | Security measures -- United States
- Small business -- Computer networks | Security measures -- United States -- Costs
- Small business -- Data processing | Security measures -- United States
- Small business -- Security measures -- United States
- Smart power grids -- Security measures -- United States
- Smithsonian Institution -- Security measures
- Sports facilities -- Security measures -- Europe
- Stadiums -- Security measures -- New Jersey | East Rutherford
- Stadiums -- Security measures -- United States
- Stock exchanges -- Security measures -- United States
- Stock exchanges -- United States -- Communication systems | Security measures
- Stores, Retail -- Oregon | Portland -- Security measures
- Student aid -- Computer networks | Security measures -- United States
- Subways -- Security measures -- Washington Metropolitan Area
- Super Bowl, 2014, East Rutherford, N.J. -- Security measures
- Supervisory control systems -- Security measures
- Supervisory control systems -- Security measures -- United States
- Tankers -- Security measures
- Tankers -- Security measures -- Texas | Houston
- Tankers -- Security measures -- United States
- Tax refunds -- Security measures -- United States
- Tax returns -- Data processing | Security measures -- United States -- Evaluation
- Tax returns -- Security measures -- United States -- Periodicals
- Tax returns -- United States -- Databases | Security measures
- Technical publishing -- Security measures -- United States
- Telecommunication -- Equipment and supplies | Security measures -- United States
- Telecommunication -- Security measures
- Telecommunication -- Security measures
- Telecommunication -- Security measures -- United States
- Telecommunication -- Security measures | Government policy -- United States
- Telecommunication -- Technological innovations | Security measures -- United States
- Telecommunication systems -- Security measures -- United States
- Telecommunication systems -- Security measures | Data processing
- Telecommunication systems -- Security measures | Government policy -- United States
- Telephone systems -- Security measures
- Testing laboratories -- Security measures -- United States
- Tourism -- Security measures -- United States
- Trans Union (U.S.) -- Computer networks | Security measures
- Trans-Alaska Pipeline (Alaska) -- Security measures
- Transportation -- Passenger traffic | Security measures -- United States
- Transportation -- Security measures
- Transportation -- Security measures
- Transportation -- Security measures -- New York Metropolitan Area
- Transportation -- Security measures -- United States
- Transportation -- Security measures -- United States
- Transportation -- Security measures -- United States -- Evaluation
- Transportation -- Security measures -- United States -- Finance
- Transportation -- Security measures -- United States -- Management
- Transportation -- Security measures -- United States -- Planning
- Transportation -- Security measures -- United States -- States | Finance
- Transportation -- Security measures -- Washington (State)
- Transportation -- Security measures | Equipment and supplies
- Transportation -- Security measures | Equipment and supplies
- Transportation -- Security measures | Government policy -- United States
- Transportation -- Security measures | Technological innovations -- United States
- Transportation and state -- Security measures -- United States
- Transportation, Automotive -- Security measures -- United States
- Tribal government -- Computer networks | Security measures -- United States
- Trucking -- Security measures -- United States
- Trucking -- Security measures -- United States -- Evaluation
- Tunnels -- Security measures -- New York Metropolitan Area
- U.S. Census Bureau -- Information technology | Security measures | Evaluation
- U.S. Census Bureau -- Security measures
- U.S. Citizenship and Immigration Services -- Information technology | Security measures
- U.S. Citizenship and Immigration Services -- Information technology | Security measures | Auditing
- U.S. Customs and Border Protection -- Information technology | Security measures
- U.S. Customs and Border Protection -- Information technology | Security measures | Evaluation
- U.S. Customs and Border Protection -- Security measures | Auditing
- U.S. Nuclear Regulatory Commission -- Security measures
- U.S. Nuclear Regulatory Commission -- Security measures | Evaluation
- U.S. Nuclear Regulatory Commission, Office of Human Resources | Technical Training Center -- Security measures | Evaluation
- Uber (Firm) -- Computer networks | Security measures
- Ubiquitous computing -- Security measures -- Congresses
- United States -- Armed Forces | Security measures
- United States -- Armed Forces | Security measures -- Iraq
- United States -- Boundaries | Security measures
- United States -- Boundaries | Security measures -- Canada
- United States -- Boundaries | Security measures -- Mexico
- United States -- Boundaries | Security measures | Technological innovations
- United States -- Commerce | Security measures
- United States -- Emigration and immigration | Security measures
- United States -- Emigration and immigration | Security measures | Evaluation
- United States -- Officials and employees | Security measures
- United States -- Security measures | Evaluation
- United States Capitol (Washington, D.C.) -- Security measures
- United States Capitol (Washington, D.C.) -- Security measures | Planning
- United States Mint -- Security measures
- United States Postal Service -- Security measures
- United States Postal Service, Postal Inspection Service -- Security measures
- United States, Agency for International Development -- Buildings | Security measures
- United States, Army -- Security measures
- United States, Army -- Security measures -- Handbooks, manuals, etc
- United States, Army | Corps of Engineers -- Security measures
- United States, Bureau of Engraving and Printing -- Security measures
- United States, Bureau of Prisons -- Security measures
- United States, Bureau of Reclamation -- Security measures
- United States, Bureau of the Census -- Security measures
- United States, Bureau of the Public Debt -- Security measures
- United States, Coast Guard -- Computer networks | Security measures
- United States, Congress -- Security measures
- United States, Congress -- Security measures -- Periodicals
- United States, Congress | House -- Security measures
- United States, Defense Logistics Agency -- Security measures
- United States, Department of Agriculture -- Security measures
- United States, Department of Commerce -- Information services | Security measures
- United States, Department of Commerce -- Security measures
- United States, Department of Defense -- Buildings | Security measures | Standards
- United States, Department of Defense -- Computer networks | Security measures
- United States, Department of Defense -- Data processing | Security measures
- United States, Department of Defense -- Information technology | Security measures
- United States, Department of Defense -- Officials and employees | Security measures
- United States, Department of Defense -- Security measures
- United States, Department of Defense -- Security measures | Evaluation
- United States, Department of Defense -- Security measures | Standards
- United States, Department of Education | Federal Student Aid -- Computer networks | Security measures
- United States, Department of Energy -- Security measures
- United States, Department of Energy -- Security measures | Evaluation
- United States, Department of Energy. -- Security measures
- United States, Department of Health and Human Services -- Security measures
- United States, Department of Homeland Security -- Computer networks | Security measures
- United States, Department of Homeland Security -- Data processing | Security measures | Evaluation
- United States, Department of Homeland Security -- Electronic information resources | Security measures
- United States, Department of Homeland Security -- Information resources management | Security measures
- United States, Department of Homeland Security -- Information technology | Security measures
- United States, Department of Homeland Security -- Information technology | Security measures | Auditing
- United States, Department of Homeland Security -- Information technology | Security measures | Auditing -- Periodicals
- United States, Department of Homeland Security -- Information technology | Security measures | Evaluation
- United States, Department of Homeland Security -- Information technology | Security measures | Evaluation -- Periodicals
- United States, Department of Homeland Security -- Procurement | Security measures
- United States, Department of Homeland Security -- Security measures
- United States, Department of Homeland Security -- Security measures | Evaluation
- United States, Department of Homeland Security | Office of Inspector General -- Information technology | Security measures | Auditing
- United States, Department of Justice -- Security measures
- United States, Department of Justice -- Security measures | Evaluation
- United States, Department of State -- Buildings | Security measures
- United States, Department of State -- Security measures
- United States, Department of State -- Security measures
- United States, Department of Transportation -- Security measures
- United States, Department of Veterans Affairs -- Computer networks | Security measures
- United States, Department of Veterans Affairs -- Information technology | Security measures
- United States, Department of Veterans Affairs -- Security measures
- United States, Department of Veterans Affairs -- Security measures | Evaluation
- United States, Department of the Interior -- Security measures
- United States, Department of the Treasury | Financial Management Service -- Data processing | Security measures
- United States, Drug Enforcement Administration -- Security measures
- United States, Environmental Protection Agency -- Security measures
- United States, Federal Aviation Administration -- Communication systems | Security measures
- United States, Federal Aviation Administration -- Computer networks | Security measures
- United States, Federal Aviation Administration -- Security measures
- United States, Federal Aviation Administration -- Security measures | Evaluation
- United States, Federal Bureau of Investigation -- Security measures
- United States, Federal Emergency Management Agency -- Information technology | Security measures | Auditing
- United States, Food and Drug Administration -- Information technology | Security measures | Evaluation
- United States, General Services Administration -- Security measures | Evaluation
- United States, Health Care Financing Administration -- Data processing | Security measures
- United States, Health Care Financing Administration -- Security measures
- United States, Internal Revenue Service -- Computer networks | Security measures
- United States, Internal Revenue Service -- Data processing | Security measures
- United States, Internal Revenue Service -- Information technology | Security measures
- United States, Internal Revenue Service -- Security measures
- United States, Internal Revenue Service -- Security measures | Evaluation
- United States, National Aeronautics and Space Administration -- Information technology | Security measures
- United States, National Aeronautics and Space Administration -- Security measures
- United States, National Archives and Records Administration -- Security measures
- United States, National Archives and Records Administration -- Security measures -- Handbooks, manuals, etc
- United States, National Background Investigations Bureau -- Security measures
- United States, National Nuclear Security Administration -- Security measures
- United States, National Park Service -- Security measures
- United States, National Security Agency -- Security measures
- United States, Office of Energy, Science, and Environment -- Security measures
- United States, Office of Personnel Management -- Computer networks | Security measures
- United States, Office of Personnel Management -- Security measures
- United States, Public Buildings Service -- Security measures
- United States, Secret Service -- Information technology | Security measures
- United States, Securities and Exchange Commission -- Computer networks | Security measures
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>