Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Jacksonville Public Library.
The Resource
Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Jacksonville Public Library.
- Label
- Security measures
A sample of Items that are about the Topic Security measures See All
Context
Context of Security measuresSubfocus of
No resources found
No enriched resources found
- 5G mobile communication systems -- Security measures -- United States
- 5G mobile communication systems -- Security measures -- United States -- Planning
- Administrative agencies -- Computer networks | Access control | Security measures
- Administrative agencies -- Computer networks | Security measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States -- Evaluation
- Administrative agencies -- Computer networks | Security measures -- United States -- Planning -- Periodicals
- Administrative agencies -- Computer networks | Security measures | Research -- United States
- Administrative agencies -- Computer networks | Security measures | Research -- United States -- Periodicals
- Administrative agencies -- Data processing | Access control | Security measures
- Administrative agencies -- Data processing | Security measures
- Administrative agencies -- Data processing | Security measures -- United States
- Administrative agencies -- Information technology | Security measures -- United States
- Administrative agencies -- Security measures
- Administrative agencies -- Security measures -- United States
- Administrative agencies -- Security measures -- United States -- Evaluation
- Administrative agencies -- United States -- Data processing | Security measures | Evaluation
- Advertising -- Airlines | Security measures -- United States
- Aeronautics -- Law and legislation | Security measures -- United States
- Aeronautics -- Security measures
- Aeronautics -- Security measures -- United States
- Aeronautics -- Security measures -- United States -- Computer programs
- Aeronautics -- Security measures -- United States -- Management | Evaluation
- Aeronautics -- Security measures | International cooperation
- Aeronautics, Commercial -- Computer networks | Security measures
- Aeronautics, Commercial -- Freight | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Passenger traffic | Security measures | Government policy -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures | Technological innovations -- United States -- Costs
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures -- California | Los Angeles
- Aeronautics, Commercial -- Security measures -- Chile
- Aeronautics, Commercial -- Security measures -- Cuba
- Aeronautics, Commercial -- Security measures -- European Union countries
- Aeronautics, Commercial -- Security measures -- Illinois
- Aeronautics, Commercial -- Security measures -- Pacific Area
- Aeronautics, Commercial -- Security measures -- United Arab Emirates | Abū Ẓaby
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States -- Costs
- Aeronautics, Commercial -- Security measures -- United States -- Costs | Evaluation
- Aeronautics, Commercial -- Security measures -- United States -- Evaluation
- Aeronautics, Commercial -- Security measures -- United States -- Finance
- Aeronautics, Commercial -- Security measures -- United States -- Management
- Aeronautics, Commercial -- Security measures -- United States -- Planning
- Aeronautics, Commercial -- Security measures -- United States -- Testing
- Aeronautics, Commercial -- Security measures -- Virginia
- Aeronautics, Commercial -- Security measures | Equipment and supplies
- Aeronautics, Commercial -- Security measures | Evaluation
- Aeronautics, Commercial -- Security measures | Government policy -- United States
- Aeronautics, Commercial -- Security measures | International cooperation
- Aeronautics, Commercial -- Security measures | Law and legislation -- United States
- Aeronautics, Commercial -- Security measures | Research -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States -- Costs
- Agricultural industries -- Security measures -- United States
- Agriculture -- Security measures -- United States
- Agriculture -- Security measures -- United States -- Evaluation
- Air bases -- Security measures -- United States
- Air bases -- Security measures -- United States -- Case studies
- Air traffic control -- Security measures -- United States
- Air travel -- Security measures -- United States
- Airline passenger security screening -- Computer networks | Security measures -- United States
- Airlines -- Management | Security measures
- Airlines -- Security measures
- Airlines -- Security measures -- Argentina -- International cooperation
- Airlines -- Security measures -- Austria -- International cooperation
- Airlines -- Security measures -- Belgium -- International cooperation
- Airlines -- Security measures -- Bolivia -- International cooperation
- Airlines -- Security measures -- Brazil -- International cooperation
- Airlines -- Security measures -- Canada -- International cooperation
- Airlines -- Security measures -- Ecuador -- International cooperation
- Airlines -- Security measures -- Germany -- International cooperation
- Airlines -- Security measures -- Great Britain -- International cooperation
- Airlines -- Security measures -- Grenada -- International cooperation
- Airlines -- Security measures -- Honduras -- International cooperation
- Airlines -- Security measures -- India
- Airlines -- Security measures -- Indonesia
- Airlines -- Security measures -- Ireland -- International cooperation
- Airlines -- Security measures -- Israel -- International cooperation
- Airlines -- Security measures -- Italy -- International cooperation
- Airlines -- Security measures -- Korea (South) -- International cooperation
- Airlines -- Security measures -- Malaysia -- International cooperation
- Airlines -- Security measures -- Nicaragua -- International cooperation
- Airlines -- Security measures -- Peru -- International cooperation
- Airlines -- Security measures -- Romania -- International cooperation
- Airlines -- Security measures -- Saint Kitts and Nevis -- International cooperation
- Airlines -- Security measures -- Singapore -- International cooperation
- Airlines -- Security measures -- South Africa
- Airlines -- Security measures -- Soviet Union -- International cooperation
- Airlines -- Security measures -- Spain -- International cooperation
- Airlines -- Security measures -- Switzerland -- International cooperation
- Airlines -- Security measures -- Turkey -- International cooperation
- Airlines -- Security measures -- United States
- Airlines -- Security measures -- United States -- Auditing
- Airlines -- Security measures -- United States -- Evaluation
- Airlines -- Security measures -- United States -- International cooperation
- Airlines -- Security measures -- Uruguay -- International cooperation
- Airlines -- Security measures -- Yugoslavia -- International cooperation
- Airlines -- Security measures -- Zambia -- International cooperation
- Airlines -- Security measures | Economic aspects -- United States
- Airlines -- Security measures | Government policy -- United States
- Airlines -- Security measures | International cooperation
- Airlines -- Security measures | International cooperation
- Airmen -- Medical care -- United States -- Data processing | Security measures
- Airplanes -- Foreign countries -- Maintenance and repair | Security measures
- Airplanes -- Monitoring | Security measures -- United States
- Airport buildings -- Security measures -- United States
- Airports -- Baggage handling | Security measures
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu
- Airports -- Baggage handling | Security measures -- Hawaii | Honolulu -- Evaluation
- Airports -- Baggage handling | Security measures -- United States
- Airports -- Baggage handling | Security measures -- United States -- Costs | Evaluation
- Airports -- Baggage handling | Security measures -- United States -- Evaluation
- Airports -- Baggage handling | Security measures -- United States -- Finance
- Airports -- Baggage handling | Security measures -- United States -- Management
- Airports -- Baggage handling | Security measures | Government policy -- United States
- Airports -- Baggage handling | Security measures | International cooperation
- Airports -- Information technology | Security measures -- United States
- Airports -- Inspection | Security measures -- United States
- Airports -- Law and legislation | Security measures -- United States
- Airports -- Security measures
- Airports -- Security measures
- Airports -- Security measures -- California | Los Angeles
- Airports -- Security measures -- California | Los Angeles -- Costs
- Airports -- Security measures -- California | Ontario -- Costs
- Airports -- Security measures -- Cuba
- Airports -- Security measures -- Fiction
- Airports -- Security measures -- New Jersey | Newark
- Airports -- Security measures -- United States
- Airports -- Security measures -- United States -- Equipment and supplies
- Airports -- Security measures -- United States -- Evaluation
- Airports -- Security measures -- United States -- Finance
- Airports -- Security measures -- United States -- Management
- Airports -- Security measures -- United States -- Testing
- Airports -- Security measures | International cooperation
- Airports -- Security measures | International cooperation
- Airports -- Security measures | Technological innovations
- Airports -- Security measures | Technological innovations -- United States
- Airports -- Security measures | Technological innovations -- United States -- Costs
- Airports -- United States -- Communication systems | Security measures
- Airways -- Security measures -- United States
- Ammonium nitrate -- Security measures -- United States
- Animal industry -- Security measures -- United States
- Application software -- Security measures -- United States
- Archives -- Security measures -- United States
- Artificial satellites -- Security measures -- United States
- Artificial satellites in telecommunication -- Security measures -- United States
- Automated tellers -- Security measures
- Automobiles -- Radio equipment | Security measures -- United States
- Automotive telematics -- Security measures -- United States
- BGP (Computer network protocol) -- Security measures | Standards -- United States
- Badges -- Security measures -- United States
- Ballot -- Security measures -- United States
- Banks and banking -- Security measures -- United States
- Biological laboratories -- Security measures | Evaluation
- Biological warfare -- Security measures -- United States
- Bluetooth technology -- Security measures | Standards | Government policy -- United States
- Boats and boating -- Security measures -- United States
- Border crossing -- Security measures -- United States
- Border patrols -- Security measures -- United States
- Border stations -- Security measures -- Arizona | Tucson Region -- Evaluation
- Borderlands -- Security measures
- Borderlands -- Security measures -- United States
- Borderlands -- Security measures | Government policy -- Southwestern States
- Borderlands -- Security measures | Government policy -- Southwestern States
- Bridges -- Security measures -- New York (State) | New York Metropolitan Area
- Bridges -- Security measures -- New York Metropolitan Area
- Bridges -- Security measures -- United States
- Bridges -- Security measures -- United States -- Planning
- Broadband communication systems -- Security measures -- United States
- Broadband communication systems -- Security measures -- United States
- Broadcasting -- Security measures -- United States
- Building -- Design and construction | Security measures
- Building leases -- Security measures -- United States
- Building management -- United States -- Automation | Security measures
- Building sites -- Security measures -- United States
- Buildings -- Security measures
- Buildings -- Security measures -- Handbooks, manuals, etc
- Buildings -- Security measures -- United States
- Bus lines -- Security measures -- United States
- Bus lines -- Security measures -- United States -- Finance
- Buses -- Security measures -- United States -- Evaluation
- Buses -- Security measures -- United States -- States | Finance
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Security measures -- Fiction
- Business enterprises -- Security measures -- United States
- Business enterprises -- Security measures -- United States -- Planning
- Business logistics -- Security measures
- Business logistics -- Security measures -- United States -- Evaluation
- Business logistics -- Security measures | Government policy -- United States
- Cables, Submarine -- Security measures
- Capital market -- Security measures -- United States
- Cargo handling -- Security measures -- Canada
- Cargo handling -- Security measures -- United States
- Cargo handling -- Security measures | International cooperation
- Cargo holds -- Security measures | Government policy -- United States
- Cargo ships -- Handling | Security measures
- Catfish fisheries -- Security measures -- United States -- Handbooks, manuals, etc
- Cell phone systems -- Security measures
- Cell phone systems -- Security measures -- United States
- Cell phones -- Security measures -- United States
- Centers for Medicare & Medicaid Services (U.S.) -- Computer networks | Security measures
- Centers for Medicare & Medicaid Services (U.S.) -- Data processing | Security measures
- Centers for Medicare & Medicaid Services (U.S.) -- Security measures | Auditing
- Chemical industry -- Security measures -- United States
- Chemical industry -- Security measures -- United States -- Evaluation
- Chemical industry -- Security measures | Government policy -- United States
- Chemical plants -- Security measures
- Chemical plants -- Security measures -- New Jersey
- Chemical plants -- Security measures -- United States
- Chemical plants -- Security measures | Government policy -- United States
- Chemical warfare -- Security measures -- United States
- Chicago O'Hare International Airport -- Security measures | Evaluation
- Client/server computing -- Security measures
- Client/server computing -- Security measures -- United States
- Cloud computing -- Security measures
- Cloud computing -- Security measures -- United States
- Coasts -- Security measures -- China
- Coasts -- Security measures -- United States
- Cold storage -- Security measures
- Cole (Ship) -- Security measures
- Command and control systems -- Security measures -- United States
- Commercial buildings -- Security measures -- United States
- Commercial vehicle industry -- Security measures -- United States
- Communications, Military -- Security measures -- United States
- Computer architecture -- Security measures | Standards -- United States
- Computer crimes -- Security measures -- United States
- Computer firmware -- Security measures -- United States
- Computer network architectures -- Security measures -- United States
- Computer network protocols -- Security measures | Evaluation
- Computer networks -- Remote access | Security measures -- United States
- Computer networks -- Remote access | Security measures | Standards -- United States
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Fiction
- Computer networks -- Security measures -- Germany
- Computer networks -- Security measures -- Korea (South)
- Computer networks -- Security measures -- Periodicals
- Computer networks -- Security measures -- Poland
- Computer networks -- Security measures -- Popular works
- Computer networks -- Security measures -- Russia (Federation)
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States -- Auditing
- Computer networks -- Security measures -- United States -- Case studies
- Computer networks -- Security measures -- United States -- Evaluation
- Computer networks -- Security measures -- United States -- Finance
- Computer networks -- Security measures -- United States -- Handbooks, manuals, etc
- Computer networks -- Security measures -- United States -- Periodicals
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures -- United States -- States
- Computer networks -- Security measures | Auditing
- Computer networks -- Security measures | Evaluation
- Computer networks -- Security measures | Examinations -- Study guides
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | International cooperation
- Computer networks -- Security measures | Law and legislation -- United States
- Computer networks -- Security measures | Management | Testing
- Computer networks -- Security measures | Research -- United States
- Computer networks -- Security measures | Research -- United States -- Finance
- Computer networks -- Security measures | Social aspects
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Standards -- United States
- Computer networks -- Security measures | Technological innovations -- United States
- Computer networks -- Security measures | Testing
- Computer networks -- Security measures | Vocational guidance -- Juvenile literature
- Computer security -- Security measures -- United States
- Computer security -- Security measures -- United States -- Evaluation
- Computer software -- Security measures
- Computer software -- Security measures
- Computer software -- Security measures -- Congresses
- Computer software -- Security measures -- United States
- Computer viruses -- Security measures -- United States
- Confidential business information -- Security measures
- Confidential communications -- Taxation | Security measures -- United States -- Periodicals
- Construction industry -- Security measures -- United States
- Container ships -- Security measures -- United States
- Container ships -- Security measures -- United States -- Evaluation
- Container terminals -- Security measures
- Container terminals -- Security measures -- United States
- Container terminals -- Security measures -- United States -- Evaluation
- Containerization -- Security measures -- Foreign countries
- Containerization -- Security measures -- United States
- Containerization -- Security measures | Technological innovations | Evaluation
- Containers -- Security measures
- Containers -- Security measures | Technological innovations | Evaluation
- Copying machines -- Security measures
- Corporations -- Security measures -- Drama
- Corporations -- Security measures -- United States
- Corporations -- Security measures -- United States -- Planning
- Corporations, Chinese -- Security measures -- Foreign countries
- Courthouses -- Security measures -- California | Los Angeles
- Courthouses -- Security measures -- United States
- Courthouses -- Security measures -- United States -- Costs
- Courthouses -- Security measures -- United States -- States
- Covered bridges -- Security measures -- United States
- Credit bureaus -- Computer networks | Security measures -- United States
- Credit cards -- Security measures
- Credit cards -- Security measures | Standards -- United States -- Evaluation
- Crowds -- Security measures -- New Jersey -- Planning
- Crowds -- Security measures -- United States
- Cruise lines -- Security measures | Evaluation
- Cruise ships -- Security measures -- United States
- Cruise ships -- Security measures | Evaluation
- Cryptocurrencies -- Security measures -- United States
- Customs inspection -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures
- Cyberinfrastructure -- Security measures -- Case studies
- Cyberinfrastructure -- Security measures -- Estonia
- Cyberinfrastructure -- Security measures -- Germany
- Cyberinfrastructure -- Security measures -- Norway
- Cyberinfrastructure -- Security measures -- Sweden
- Cyberinfrastructure -- Security measures -- United States
- Cyberinfrastructure -- Security measures -- United States -- Congresses
- Cyberinfrastructure -- Security measures -- United States -- Evaluation
- Cyberinfrastructure -- Security measures -- United States -- Finance
- Cyberinfrastructure -- Security measures -- United States -- States
- Cyberinfrastructure -- Security measures | Government policy -- Ukraine
- Cyberinfrastructure -- Security measures | Government policy -- United States
- Cyberinfrastructure -- Security measures | Law and legislation | Economic aspects -- United States
- Cyberinfrastructure -- Security measures | Research -- United States
- Cyberinfrastructure -- Security measures | Technological innovations -- United States
- Cyberspace -- Security measures
- Cyberspace -- Security measures -- Europe
- Cyberspace -- Security measures -- Periodicals
- Cyberspace -- Security measures -- Texas -- Planning
- Cyberspace -- Security measures -- United States
- Cyberspace -- Security measures -- United States -- Management
- Cyberspace -- Security measures -- United States -- Planning
- Cyberspace -- Security measures -- United States -- States
- Cyberspace -- Security measures -- United States -- States | Planning
- Cyberspace -- Security measures | Government policy
- Cyberspace -- Security measures | Government policy -- United States
- Cyberspace -- Security measures | History
- Cyberspace -- Security measures | Research -- United States
- Cyberterrorism -- Security measures -- United States
- Dairy products industry -- Security measures -- United States
- Dams -- Security measures -- United States
- Data centers -- Security measures -- United States
- Data protection -- Security measures
- Data protection -- Security measures -- United States
- Data transmission systems -- Security measures
- Data transmission systems -- United States -- Automation | Security measures
- Debts, Public -- Computer networks | Security measures -- United States -- Evaluation
- Defense contracts -- United States -- Data processing | Security measures
- Defense industries -- Security measures
- Defense industries -- Security measures -- Periodicals
- Defense industries -- Security measures -- United States
- Defense industries -- Security measures -- United States -- Periodicals
- Defense industries -- United States -- Security measures | Evaluation
- Defense information, Classified -- Security measures | International cooperation
- Defense information, Classified -- United States -- Security measures | Evaluation
- Detector dogs -- Transportation | Security measures
- Digital communications -- Security measures -- United States
- Diplomatic and consular service -- Security measures -- United States
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures -- Iraq
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya | Banghāzī
- Diplomatic and consular service, American -- Buildings | Security measures -- Yemen (Republic)
- Diplomatic and consular service, American -- Buildings | Security measures | Law and legislation
- Diplomatic and consular service, American -- Gabon -- Buildings | Security measures
- Diplomatic and consular service, American -- Security measures
- Directory services (Computer network technology) -- Security measures -- United States
- Drinking water -- Security measures -- United States
- Drinking water -- Security measures -- United States -- Finance
- Drinking water -- Security measures | Government policy -- United States
- Drivers' licenses -- Security measures -- United States
- Dwellings -- Security measures
- Dwellings -- Security measures -- Amateurs' manuals
- Dwellings -- Security measures -- United States
- Dwellings -- Security measures -- United States -- Handbooks, manuals, etc
- Economic development projects -- Security measures -- Afghanistan
- Education -- Computer networks | Security measures -- United States
- Elections -- Computer networks | Security measures -- United States
- Elections -- Equipment and supplies | Security measures -- United States
- Elections -- Security measures -- United States
- Elections -- United States -- Equipment and supplies | Security measures
- Elections -- United States -- Equipment and supplies | Security measures | Planning
- Electric industries -- Security measures -- United States
- Electric networks -- Security measures -- United States
- Electric power distribution -- Security measures -- Canada
- Electric power distribution -- Security measures -- Mexico
- Electric power distribution -- Security measures -- United States
- Electric power distribution -- Security measures | Research -- United States
- Electric power distribution -- United States -- Automation | Security measures
- Electric power failures -- Security measures -- United States -- Evaluation
- Electric power systems -- Security measures
- Electric power systems -- Security measures
- Electric power systems -- Security measures -- Canada
- Electric power systems -- Security measures -- Mexico
- Electric power systems -- Security measures -- United States
- Electric power systems -- Security measures -- United States -- Evaluation
- Electric power systems -- Security measures | Government policy -- United States
- Electric power transmission -- Security measures -- United States
- Electric substations -- Security measures -- United States
- Electric transformers -- Security measures -- United States
- Electric utilities -- Security measures
- Electric utilities -- Security measures -- United States
- Electric utilities -- Security measures | Government policy -- United States
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures
- Electronic commerce -- Security measures -- Juvenile literature
- Electronic commerce -- Security measures -- United States
- Electronic commerce -- Security measures -- United States -- Public opinion
- Electronic commerce -- Security measures | Standards
- Electronic data interchange -- Security measures
- Electronic data processing -- Distributed processing | Security measures
- Electronic data processing -- Security measures -- United States
- Electronic data processing departments -- Security measures
- Electronic data processing departments -- Security measures -- United States
- Electronic data processing departments -- Security measures -- United States -- Auditing
- Electronic data processing departments -- Security measures | Congresses
- Electronic filing of tax returns -- Security measures -- United States
- Electronic filing systems -- Security measures -- United States
- Electronic funds transfers -- Security measures
- Electronic funds transfers -- Security measures -- United States
- Electronic government information -- Security measures -- United States
- Electronic government information -- Security measures -- United States -- Evaluation
- Electronic government information -- Security measures -- United States -- Handbooks, manuals, etc
- Electronic government information -- Security measures -- United States -- Periodicals
- Electronic government information -- Security measures | Computer programs
- Electronic government information -- Security measures | Evaluation
- Electronic government information -- Security measures | Standards -- United States
- Electronic information resources -- Security measures -- United States
- Electronic mail systems -- Security measures
- Electronic mail systems -- Security measures -- Fiction
- Electronic mail systems -- Security measures -- United States
- Electronic records -- Security measures -- United States
- Electronic records -- Security measures -- United States -- Examinations, questions, etc
- Electronic records -- Security measures | Government policy -- United States
- Electronic systems -- Security measures -- United States
- Electronic voting -- Computer networks | Security measures -- United States
- Electronic voting -- Security measures -- Illinois
- Electronic voting -- Security measures -- United States
- Embassy buildings -- Security measures
- Embassy buildings -- Security measures
- Embassy buildings -- Security measures -- Afghanistan
- Embassy buildings -- Security measures -- Central African Republic
- Embassy buildings -- Security measures -- Congo (Democratic Republic)
- Embassy buildings -- Security measures -- England | London
- Embassy buildings -- Security measures -- Fiction
- Embassy buildings -- Security measures -- Iraq
- Embassy buildings -- Security measures -- Mexico
- Embassy buildings -- Security measures -- United States
- Embassy buildings -- Security measures -- United States -- Evaluation
- Embassy buildings -- Security measures -- United States -- Finance
- Embassy buildings -- Security measures | Law and legislation
- Embassy buildings -- Security measures | Law and legislation -- United States
- Emergency communication systems -- Security measures -- United States
- Emigration and immigration -- Security measures -- United States
- Energy industries -- Security measures
- Energy industries -- Security measures -- United States
- Energy storage -- Security measures
- Environmental laboratories -- United States -- Data processing | Security measures
- Equifax, Inc. -- Computer networks | Security measures
- Executive Office for U.S. Attorneys -- Information technology | Security measures
- Executive departments -- Computer networks | Security measures -- United States
- Executive departments -- Security measures -- United States
- Experian (Firm) -- Computer networks | Security measures
- Extranets (Computer networks) -- Security measures | Standards -- United States
- Farm produce -- Security measures -- United States
- Federal Deposit Insurance Corporation -- Computer networks | Security measures
- Federal Deposit Insurance Corporation -- Information technology | Security measures
- Federal Deposit Insurance Corporation -- Information technology | Security measures | Evaluation
- Federal Deposit Insurance Corporation -- Security measures
- Federal National Mortgage Association -- Security measures
- Federal Reserve banks -- Information technology | Security measures
- Federal Reserve banks -- Security measures | Evaluation
- Federal government -- Computer networks | Security measures -- United States
- Federal government -- Computer networks | Security measures -- United States -- Handbooks, manuals, etc
- Federal government -- Computer networks | Security measures | Standards -- United States
- Federal government -- Computer networks | Security measures | Standards | Government policy -- United States
- Federal government -- Information technology | Security measures -- United States
- Federal government -- Information technology | Security measures -- United States -- Handbooks, manuals, etc
- Federal government -- United States -- Computer network resources | Security measures
- Ferries -- Security measures -- United States
- Finance, Personal -- Security measures
- Financial institutions -- Computer networks | Security measures -- United States
- Financial institutions -- Computer networks | Security measures | Government policy -- United States
- Financial institutions -- Security measures -- United States
- Financial services industry -- Computer networks | Security measures -- United States
- Financial services industry -- Security measures -- United States
- Financial services industry -- Security measures | Computer networks -- United States
- Financial services industry -- United States -- Databases | Security measures
- Firearms -- Security measures -- United States
- Fishery processing -- Security measures -- United States
- Fishery processing plants -- Security measures -- United States
- Flight training -- Security measures | Government policy -- United States
- Food handling -- Security measures -- United States
- Food industry and trade -- Security measures -- United States
- Food industry and trade -- Security measures | Government policy -- United States
- Food of animal origin -- Transportation | Security measures -- United States
- Food relief -- Security measures -- United States
- Food supply -- Security measures -- United States
- Food supply -- Security measures | Government policy -- United States
- Freddie Mac (Firm) -- Security measures
- Freight and freightage -- Security measures -- Foreign countries
- Freight and freightage -- Security measures -- United States
- Freight and freightage -- Security measures -- United States -- Evaluation
- Freight and freightage -- Security measures -- United States -- Finance
- Gasoline supply -- Security measures -- United States
- Geological Survey (U.S.) -- Information technology | Security measures
- Global Information Grid -- Security measures
- Global Positioning System -- Security measures -- United States
- Global Positioning System -- Security measures | Data processing
- Global system for mobile communications -- Security measures -- United States
- Government Web sites -- Security measures -- United States
- Government communication systems -- Security measures -- United States
- Government communication systems -- Security measures -- United States -- Evaluation
- Government communication systems -- Security measures -- United States -- Periodicals
- Government information -- Computer networks | Security measures -- United States
- Government information -- Security measures
- Government information -- Security measures -- Georgia | Atlanta -- Evaluation
- Government information -- Security measures -- Illinois | Lisle -- Evaluation
- Government information -- Security measures -- Pennsylvania | King of Prussia -- Evaluation
- Government information -- Security measures -- Texas | Arlington -- Evaluation
- Government information -- Security measures -- United States
- Government information -- Security measures -- United States -- Auditing
- Government information -- Security measures -- United States -- Evaluation
- Government information -- Security measures | Law and legislation -- United States
- Government information -- United States -- Data processing | Security measures
- Government property -- Security measures
- Government property -- Security measures
- Government property -- Security measures -- Iraq
- Government property -- Security measures -- United States
- Government property -- Security measures -- United States -- Evaluation
- Government property -- Security measures | Standards -- United States
- Government purchasing -- Security measures -- United States
- Green cards -- Security measures | Evaluation
- Guided missiles -- Security measures
- Harbors -- Security measures
- Harbors -- Security measures
- Harbors -- Security measures -- California
- Harbors -- Security measures -- Florida | Miami
- Harbors -- Security measures -- New York (State) | New York
- Harbors -- Security measures -- Texas | Houston
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States -- Evaluation
- Harbors -- Security measures -- United States -- Finance
- Harbors -- Security measures -- United States -- Periodicals
- Harbors -- Security measures -- Washington (State)
- Harbors -- Security measures | Government policy -- United States
- Hazardous materials transportation -- Security measures -- United States
- Hazardous substances -- Security measures -- United States
- Hazardous substances -- Transportation | Security measures
- Hazardous substances -- Transportation | Security measures -- United States
- Hazardous waste sites -- Security measures -- United States
- Health facilities -- Security measures -- United States
- Health insurance exchanges -- Security measures -- United States
- Highly enriched uranium -- Security measures
- Highly enriched uranium -- Security measures | Evaluation
- Home automation -- Security measures -- United States
- Home computer networks -- Security measures -- United States
- Honolulu International Airport -- Security measures | Evaluation
- Hospital pharmacies -- Security measures -- United States -- Evaluation
- Hosting of sporting events -- Security measures -- United States
- Housing, Single family -- Security measures -- Fiction
- Hydroelectric power plants -- Security measures -- United States -- Finance
- Idaho National Laboratory -- Security measures
- Identification cards -- Security measures -- United States
- Identification cards -- Security measures -- United States -- Evaluation
- Industries -- Security measures -- United States
- Industries -- Security measures -- United States -- Auditing
- Industries -- Security measures -- United States -- Evaluation
- Industries -- Security measures -- United States -- Planning
- Industries -- Security measures | Evaluation
- Industry -- Security measures
- Information networks -- Security measures
- Information networks -- Security measures -- Congresses
- Information networks -- Security measures -- United States
- Information networks -- Security measures | Government policy -- United States
- Information resources -- Security measures | Government policy -- United States
- Information resources management -- Security measures -- United States
- Information storage and retrieval systems -- Business | Security measures
- Information storage and retrieval systems -- Business | Security measures -- United States
- Information storage and retrieval systems -- Environmental protection | Security measures | Evaluation
- Information storage and retrieval systems -- Finance | Security measures -- United States
- Information storage and retrieval systems -- Finance | Security measures | Government policy -- United States
- Information storage and retrieval systems -- Medical care | Security measures -- United States
- Information storage and retrieval systems -- Security measures
- Information storage and retrieval systems -- Security measures -- United States
- Information storage and retrieval systems -- Security measures -- United States -- Evaluation -- Periodicals
- Information storage and retrieval systems -- Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures | Management
- Information storage and retrieval systems -- Security measures | Standards
- Information storage and retrieval systems -- Security measures | Standards -- United States
- Information storage and retrieval systems -- United States | Security measures
- Information storage and retrieval systems -- United States | Security measures -- United States
- Information storage and retrieval systems -- United States | Security measures -- United States -- Evaluation
- Information storage and retrieval systems -- United States | Security measures | Evaluation
- Information storage and retrieval systems -- United States | Security measures | Government policy
- Information storage and retrieval systems -- United States | Security measures | Government policy -- United States
- Information storage and retrieval systems -- United States | Security measures | Management
- Information storage and retrieval systems -- United States | Security measures | Standards -- United States
- Information storage and retrieval systems -- United States | Security measures | Standards | Government policy
- Information superhighway -- Security measures
- Information superhighway -- Security measures -- Congresses
- Information superhighway -- Security measures -- United States
- Information superhighway -- Security measures -- United States -- Periodicals
- Information superhighway -- Security measures | Government policy -- United States
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures -- California | Laguna Niguel -- Evaluation
- Information technology -- Security measures -- Idaho | Pocatello
- Information technology -- Security measures -- Maryland | Rockville
- Information technology -- Security measures -- United States
- Information technology -- Security measures -- United States -- Auditing
- Information technology -- Security measures -- United States -- Auditing -- Handbooks, manuals, etc
- Information technology -- Security measures -- United States -- Case studies
- Information technology -- Security measures -- United States -- Evaluation
- Information technology -- Security measures -- United States -- Evaluation -- Periodicals
- Information technology -- Security measures -- United States -- Planning
- Information technology -- Security measures -- United States -- Planning | Auditing
- Information technology -- Security measures | Auditing
- Information technology -- Security measures | Auditing -- Periodicals
- Information technology -- Security measures | Documentation -- United States
- Information technology -- Security measures | Employees | Training of
- Information technology -- Security measures | Government policy
- Information technology -- Security measures | Government policy -- United States
- Information technology -- Security measures | Standards
- Information technology -- Security measures | Standards -- United States
- Information technology -- Security measures | Standards | Government policy -- United States
- Information technology -- Security measures | Testing
- Infrastructure (Economics) -- Computer networks | Security measures -- United States
- Infrastructure (Economics) -- Security measures
- Infrastructure (Economics) -- Security measures -- Iraq
- Infrastructure (Economics) -- Security measures -- Laos
- Infrastructure (Economics) -- Security measures -- United States
- Infrastructure (Economics) -- Security measures -- United States
- Infrastructure (Economics) -- Security measures -- United States -- Planning
- Infrastructure (Economics) -- Security measures -- United States -- Planning | Evaluation
- Infrastructure (Economics) -- Security measures | Government policy -- United States
- Infrastructure (Economics) -- United States -- Data processing | Security measures
- Insurance exchanges -- Security measures -- United States
- Intelligence service -- Security measures -- United States -- Auditing -- Periodicals
- Intelligence service -- Security measures -- United States -- Evaluation
- Intelligence service -- Security measures -- United States -- Evaluation -- Periodicals
- Intelligent Transportation Systems -- Security measures
- Intelligent buildings -- Security measures -- United States
- Intelligent control systems -- Security measures -- United States
- Interagency coordination -- Security measures
- Internal security -- Security measures | Government policy -- United States
- International airports -- Security measures
- International airports -- Security measures | Evaluation
- International airports -- Security measures | International cooperation
- International business enterprises -- Security measures -- United States
- International travel -- Security measures -- United States
- International travel regulations -- Security measures -- United States
- Internet -- Security measures
- Internet -- Security measures
- Internet -- Security measures -- Asia
- Internet -- Security measures -- Drama
- Internet -- Security measures -- Fiction
- Internet -- Security measures -- Juvenile literature
- Internet -- Security measures -- United States
- Internet -- Security measures | Government policy
- Internet -- Security measures | Government policy -- European Union countries
- Internet -- Security measures | Government policy -- United States
- Internet -- Security measures | Government policy -- United States -- Evaluation
- Internet -- Security measures | Research -- United States
- Internet advertising -- Security measures -- United States
- Internet and children -- Security measures -- United States -- Evaluation
- Internet auctions -- Security measures -- United States
- Internet domain names -- Security measures
- Internet in medicine -- Security measures -- United States
- Internet in political campaigns -- Security measures -- United States
- Internet of things -- Security measures -- China
- Internet of things -- Security measures -- United States
- Internet of things -- Security measures -- United States
- Internet service providers -- Security measures -- United States
- Internet telephony -- Security measures -- United States
- Investments, Chinese -- Security measures
- Investments, Foreign -- Security measures -- United States
- Irradiation -- United States -- Equipment and supplies | Security measures
- Jails -- Security measures -- United States
- Job Corps (U.S.) -- Security measures
- John F. Kennedy International Airport -- Security measures | Auditing
- Laboratories -- Security measures -- United States
- Laptop computers -- Security measures
- Laptop computers -- Security measures -- United States
- Law enforcement -- Security measures -- United States
- Law enforcement -- United States -- Information services | Security measures
- Lawrence Livermore National Laboratory -- Security measures
- Lawrence Livermore National Laboratory -- Security measures | Evaluation
- Libraries -- Security measures
- Libraries -- Security measures -- Handbooks, manuals, etc
- Libraries -- Security measures | Planning
- Libraries -- United States -- Security measures
- Library information networks -- Security measures -- United States
- Liquefied gases -- Transportation | Security measures
- Liquefied gases -- Transportation | Security measures -- United States
- Local government -- Computer networks | Security measures -- United States
- Local transit -- Security measures -- New Jersey -- Finance
- Local transit -- Security measures -- New York (State) | New York
- Local transit -- Security measures -- New York (State) | New York -- Finance
- Local transit -- Security measures -- United States
- Local transit -- Security measures -- United States -- Evaluation
- Local transit -- Security measures -- United States -- Examinations, questions, etc
- Local transit -- Security measures -- United States -- Finance
- Local transit -- Security measures -- United States -- States | Finance
- Local transit -- Security measures -- Washington Metropolitan Area
- Local transit -- Security measures | Government policy -- United States
- Local transit -- Security measures | Technological innovations -- United States
- Logan International Airport -- Security measures -- United States
- Logistics -- Security measures
- Los Alamos National Laboratory -- Security measures
- Los Alamos National Laboratory -- Security measures | Evaluation
- Los Alamos Scientific Laboratory -- Security measures
- Low level radioactive waste disposal facilities -- Security measures -- United States
- Luggage -- Security measures -- United States
- Manufacturing industries -- Security measures -- United States
- Marine terminals -- Security measures
- Marine terminals -- Security measures -- New York (State) | New York
- Marine terminals -- Security measures -- United States
- Marine terminals -- Security measures -- Washington (State)
- Medicaid -- Claims administration | Security measures
- Medicaid -- Security measures
- Medical care -- Information technology | Security measures
- Medical care -- Information technology | Security measures -- United States
- Medical electronics equipment industry -- Information technology | Security measures | Government policy -- United States
- Medical informatics -- Security measures -- United States
- Medical informatics -- Security measures | Government policy -- United States
- Medical laboratories -- Security measures -- United States
- Medical personnel -- Malpractice -- United States -- Databases | Security measures | Evaluation
- Medical records -- Data processing | Security measures
- Medical records -- Security measures -- United States
- Medical records -- United States -- Data processing | Security measures
- Medicare -- Claims administration | Computer networks | Security measures
- Medicare -- Security measures
- Medicare -- Security measures | Auditing
- Merchant marine -- Security measures
- Merchant marine -- Security measures -- United States
- Merchant marine -- Security measures | International cooperation
- Merchant ships -- Security measures | Government policy -- United States
- Metropolitan areas -- Security measures -- United States
- Metropolitan areas -- Security measures -- United States -- Finance
- Mexican-American Border Region -- Security measures
- Mexican-American Border Region -- Security measures -- Periodicals
- Microbiological laboratories -- Security measures -- United States
- Microcomputers -- Security measures
- Microcomputers -- Security measures | Computer programs
- Microsoft Corporation -- Security measures -- Case studies
- Microsoft software -- Security measures
- Military art and science -- Technological innovations | Security measures -- United States
- Military bases -- Security measures -- United States
- Military bases -- Security measures -- United States -- Evaluation
- Military bases, American -- Security measures
- Military bases, American -- Security measures -- Afghanistan
- Military bases, American -- Security measures -- Foreign countries
- Military supplies -- Security measures -- Handbooks, manuals, etc
- Mobile apps -- Security measures | Standards -- United States
- Mobile communication systems -- Security measures -- United States
- Mobile computing -- Security measures
- Mobile computing -- Security measures -- United States
- Mobile computing -- Security measures | Government policy -- United States
- Mobile computing -- Security measures | Standards -- United States
- Money -- Transportation | Security measures
- Monuments -- Security measures -- United States
- Monuments -- Security measures -- Washington (D.C.)
- Motels -- Security measures -- United States
- Motorcades -- Security measures -- United States -- Planning
- Municipal lighting -- Security measures -- United States
- National Airspace System (U.S.) -- Security measures
- National Institute of Standards and Technology (U.S.) -- Buildings | Security measures
- National Institute of Standards and Technology (U.S.) -- Buildings | Security measures | Evaluation
- National Institute of Standards and Technology (U.S.) -- Security measures
- National Practitioner Data Bank (Information retrieval system) -- Security measures | Evaluation
- National parks and reserves -- Security measures -- United States
- Natural gas pipelines -- Security measures -- United States
- Network-centric operations (Military science) -- Security measures -- Germany
- Network-centric operations (Military science) -- Security measures -- Korea (South)
- Network-centric operations (Military science) -- Security measures -- Poland
- Network-centric operations (Military science) -- Security measures -- United States
- Network-centric operations (Military science) -- Security measures | Government policy -- Singapore
- Network-centric operations (Military science) -- Security measures | Government policy -- United States
- Nevada National Security Site (Nev.) -- Security measures -- Periodicals
- New York (State), Metropolitan Transportation Authority -- Security measures | Costs | Auditing
- Noncitizen detention centers -- Security measures -- United States
- Nonprofit organizations -- Security measures -- United States
- Nonprofit organizations -- Security measures -- United States -- Finance
- Northern Illinois Railroad Company -- Security measures | Costs | Auditing
- Nuclear energy -- Research | Laboratories | Security measures
- Nuclear energy -- Research | Laboratories | Security measures -- New Mexico | Los Alamos
- Nuclear energy -- Research | Laboratories | Security measures -- United States
- Nuclear energy -- Security measures
- Nuclear energy -- Security measures
- Nuclear energy -- Security measures -- Korea (South)
- Nuclear energy -- Security measures -- United States
- Nuclear facilities -- Computer networks | Security measures
- Nuclear facilities -- Computer networks | Security measures -- United States
- Nuclear facilities -- Information resources management | Security measures -- Georgia | Atlanta -- Evaluation
- Nuclear facilities -- Licenses | Security measures -- United States
- Nuclear facilities -- Security measures
- Nuclear facilities -- Security measures
- Nuclear facilities -- Security measures -- Former Soviet republics
- Nuclear facilities -- Security measures -- France
- Nuclear facilities -- Security measures -- Germany
- Nuclear facilities -- Security measures -- Germany (West)
- Nuclear facilities -- Security measures -- Great Britain
- Nuclear facilities -- Security measures -- Handbooks, manuals, etc
- Nuclear facilities -- Security measures -- India
- Nuclear facilities -- Security measures -- New Mexico | Kirtland Air Force Base -- Evaluation
- Nuclear facilities -- Security measures -- Russia (Federation)
- Nuclear facilities -- Security measures -- South Carolina | Savannah River Site -- Equipment and supplies | Management
- Nuclear facilities -- Security measures -- Spain
- Nuclear facilities -- Security measures -- Tennessee -- Evaluation
- Nuclear facilities -- Security measures -- United States
- Nuclear facilities -- Security measures -- United States -- Equipment and supplies
- Nuclear facilities -- Security measures -- United States -- Equipment and supplies | Management
- Nuclear facilities -- Security measures -- United States -- Evaluation
- Nuclear facilities -- Security measures -- United States -- Finance
- Nuclear facilities -- Security measures -- United States -- Planning
- Nuclear facilities -- Security measures | Evaluation
- Nuclear facilities -- Security measures | Government policy -- United States
- Nuclear facilities -- Security measures | International cooperation
- Nuclear facilities -- Security measures | International cooperation -- Examinations, questions, etc
- Nuclear facilities -- Security measures | Law and legislation -- United States
- Nuclear fuels -- Security measures
- Nuclear fuels -- Security measures | International cooperation
- Nuclear industry -- Georgia | Atlanta -- Information services | Security measures | Evaluation
- Nuclear industry -- Security measures
- Nuclear industry -- Security measures
- Nuclear industry -- Security measures -- India
- Nuclear industry -- Security measures -- United States
- Nuclear industry -- Security measures -- United States -- Evaluation
- Nuclear nonproliferation -- Security measures -- United States
- Nuclear power plant operators -- Security measures | Law and legislation -- United States
- Nuclear power plants -- Computer networks | Security measures -- United States
- Nuclear power plants -- Control rooms | Security measures -- United States
- Nuclear power plants -- Data processing | Security measures
- Nuclear power plants -- Security measures
- Nuclear power plants -- Security measures
- Nuclear power plants -- Security measures -- Handbooks, manuals, etc
- Nuclear power plants -- Security measures -- North Carolina | Wilmington
- Nuclear power plants -- Security measures -- Pennsylvania
- Nuclear power plants -- Security measures -- Periodicals
- Nuclear power plants -- Security measures -- United States
- Nuclear power plants -- Security measures -- United States -- Auditing
- Nuclear power plants -- Security measures -- United States -- Equipment and supplies | Defects
- Nuclear power plants -- Security measures -- United States -- Terminology
- Nuclear power plants -- Security measures | Auditing
- Nuclear power plants -- Security measures | International cooperation
- Nuclear power plants -- United States -- Design and construction | Security measures | Auditing
- Nuclear power plants -- United States -- Employees | Security measures
- Nuclear reactors -- Materials | Security measures | Evaluation
- Nuclear reactors -- Security measures
- Nuclear reactors -- Security measures -- United States
- Nuclear reactors -- United States -- Computer programs | Security measures
- Nuclear weapons -- Security measures
- Nuclear weapons -- Security measures -- Russia
- Nuclear weapons -- Security measures -- United States
- Nuclear weapons -- Security measures -- United States -- Finance
- Nuclear weapons -- Security measures | Evaluation
- Nuclear weapons -- Security measures | Government policy -- United States
- Nuclear weapons -- Security measures | International cooperation
- Nuclear weapons industry -- Security measures -- United States
- Nuclear weapons information -- Security measures | Evaluation
- Nuclear weapons plants -- Russia (Federation) -- Security measures
- Nuclear weapons plants -- Security measures -- New Mexico | Los Alamos
- Nuclear weapons plants -- Security measures -- United States
- Office buildings -- Security measures
- Office buildings -- Security measures -- Washington (D.C.) -- Periodicals
- Office equipment and supplies -- Security measures
- Offshore structures -- Security measures -- United States
- Offshore structures -- Security measures | International cooperation
- Olympic Games, 2004, Athens, Greece -- Security measures
- Olympics -- Security measures
- Olympics -- Security measures -- United States -- Planning
- Online databases -- Security measures
- Online databases -- Security measures -- United States
- Online social networks -- Security measures
- Online social networks -- Security measures -- Juvenile literature
- Online social networks -- Security measures -- United States
- Operating systems (Computers) -- Security measures -- United States
- Pantex Plant (U.S.) -- Security measures
- Parking facilities -- Security measures -- United States
- Passenger trains -- Security measures -- United States
- Passenger trains -- Security measures -- United States -- Finance
- Passports -- Security measures -- United States -- Planning
- Peace Corps (U.S.) -- Security measures
- Peace Corps (U.S.) -- Security measures | Evaluation
- Peer-to-peer architecture (Computer networks) -- Security measures
- Peer-to-peer architecture (Computer networks) -- Security measures -- Handbooks, manuals, etc
- Pennsylvania Avenue (Washington, D.C.) -- Security measures
- Personal identity -- Security measures
- Personal information management -- Security measures -- United States
- Petroleum -- Transportation | Security measures -- Texas | Houston
- Petroleum industry and trade -- Security measures
- Petroleum industry and trade -- Security measures -- Iraq
- Petroleum industry and trade -- Security measures -- United States
- Pharmaceutical industry -- Security measures -- United States
- Physical distribution of goods -- Security measures -- United States
- Pipelines -- Security measures -- Colombia
- Pipelines -- Security measures -- United States
- Pipelines -- Security measures | Law and legislation -- United States
- Plum Island Animal Disease Center (U.S.) -- Security measures
- Plum Island Animal Disease Laboratory -- Security measures
- Plum Island Animal Disease Laboratory -- Security measures -- United States
- Pocket computers -- Security measures
- Police communication systems -- Security measures -- United States
- Political conventions -- Security measures -- United States -- Planning
- Polling places -- Security measures -- United States
- Polling places -- Security measures -- United States -- Planning
- Port of Long Beach -- Security measures
- Port of Los Angeles -- Security measures
- Portable computers -- Security measures -- United States
- Portable computers -- Security measures | Standards -- United States
- Portable databases -- Security measures
- Ports of entry -- Security measures
- Ports of entry -- Security measures
- Ports of entry -- Security measures -- Caribbean Area
- Ports of entry -- Security measures -- Florida | Miami
- Ports of entry -- Security measures -- Iraq
- Ports of entry -- Security measures -- Mexican-American Border Region
- Ports of entry -- Security measures -- Northern boundary of the United States
- Ports of entry -- Security measures -- Texas | Houston
- Ports of entry -- Security measures -- United States
- Ports of entry -- Security measures -- United States -- Evaluation
- Ports of entry -- Security measures -- United States -- Finance
- Ports of entry -- Security measures -- United States -- Periodicals
- Ports of entry -- Security measures -- United States -- Planning
- Ports of entry -- Security measures | Economic aspects -- United States
- Ports of entry -- Security measures | Government policy -- United States
- Ports of entry -- Security measures | Technological innovations -- United States
- Postal service -- Security measures -- United States
- Postal service -- Security measures -- United States -- Congresses
- Postwar reconstruction -- Security measures -- Afghanistan
- Presidents -- Inauguration | Security measures -- United States
- Presidents -- Security measures -- United States
- Prisons -- Security measures
- Prisons -- Security measures -- United States
- Private banks -- Security measures -- United States
- Private flying -- Security measures -- United States
- Process control -- Security measures -- United States
- Public buildings -- Security measures
- Public buildings -- Security measures -- Iraq
- Public buildings -- Security measures -- Maryland | Landover
- Public buildings -- Security measures -- Michigan | Detroit
- Public buildings -- Security measures -- United States
- Public buildings -- Security measures -- United States -- Evaluation
- Public buildings -- Security measures -- United States -- Examinations, questions, etc
- Public buildings -- Security measures -- United States -- Finance
- Public buildings -- Security measures -- Virginia | Roanoke -- Costs
- Public buildings -- Security measures -- Washington (D.C.)
- Public buildings -- Security measures -- Washington (D.C.) -- Periodicals
- Public buildings -- Security measures | Standards -- United States
- Public lands -- Security measures -- United States
- Public lands -- Security measures | Government policy -- Southwestern States
- Public libraries -- Security measures -- United States
- Public records -- Security measures -- United States
- Public schools -- Security measures -- United States
- Public schools -- Security measures -- United States -- Statistics
- Public utilities -- Security measures -- United States
- Public works -- Security measures -- United States
- Radio frequency identification systems -- Security measures -- United States
- Radioactive gages -- Security measures
- Radioactive substances -- Security measures
- Radioactive substances -- Security measures -- Russia
- Radioactive substances -- Security measures -- United States
- Radioactive substances -- Security measures -- United States -- Evaluation
- Radioactive substances -- Security measures | International cooperation
- Radioactive substances -- Transportation -- United States -- Employees | Security measures
- Radioactive waste disposal -- Security measures -- South Carolina | Savannah River Site -- Management
- Radioactive wastes -- Security measures -- United States
- Radiography -- Equipment and supplies | Security measures
- Radiography -- Security measures
- Radiopharmaceuticals -- Security measures -- United States
- Railroad stations -- Security measures -- United States
- Railroad trains -- Security measures -- United States
- Railroad travel -- Security measures -- Foreign countries
- Railroads -- Commuting traffic | Security measures -- United States
- Railroads -- Passenger traffic | Security measures
- Railroads -- Passenger traffic | Security measures -- New York (State) | New York
- Railroads -- Passenger traffic | Security measures -- United States
- Railroads -- Security measures
- Railroads -- Security measures
- Railroads -- Security measures -- New York (State) -- Costs | Auditing
- Railroads -- Security measures -- New York (State) | New York Metropolitan Area
- Railroads -- Security measures -- New York Metropolitan Area
- Railroads -- Security measures -- United States
- Railroads -- Security measures -- United States -- Evaluation
- Railroads -- Security measures -- United States -- Finance
- Railroads -- Security measures -- Washington (D.C.) -- Costs | Auditing
- Records -- Security measures -- United States
- Religious facilities -- Security measures -- United States
- Rental housing -- Security measures -- United States
- Research and development contracts, Government -- Security measures -- United States -- Auditing
- Research and development projects -- Security measures -- United States
- Research, Industrial -- Security measures -- United States
- Retail trade -- Security measures
- Retail trade -- Security measures -- United States
- Retail trade -- Security measures -- United States -- Congresses
- Retail trade -- Security measures | Computer networks -- United States
- Retail trade -- United States -- Databases | Security measures
- Roads -- Security measures -- United States
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.jaxpubliclibrary.org/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.jaxpubliclibrary.org/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.jaxpubliclibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.jaxpubliclibrary.org/">Jacksonville Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.jaxpubliclibrary.org/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.jaxpubliclibrary.org/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.jaxpubliclibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.jaxpubliclibrary.org/">Jacksonville Public Library</a></span></span></span></span></div>