|
Journal | Issue |
Title |
|
Research Journal of Finance and Accounting | Vol 7, No 10 (2016) |
Securitization and the Subprime Mortgage Crisis of 2007-2008 |
Abstract
PDF
|
Job Omagwa, Robert Odunga |
|
International Affairs and Global Strategy | Vol 36 (2015) |
Securitization of Politics and Insecurity in Nigeria: The Boko Haram Experience |
Abstract
PDF
|
Aloysius-Michaels Okolie, Michael Ikechukwu Ugwueze |
|
Journal of Education and Practice | Vol 9, No 6 (2018) |
Security Management in a Terrorized Nigeria: The Task for Educators |
Abstract
PDF
|
Igbinedion, Doye Angela |
|
Journal of Education and Practice | Vol 13, No 23 (2022) |
Security Challenges and Students’ Academic Achievement in English Language in the Senior Secondary Schools in Ebonyi State |
Abstract
PDF
|
Adaobi F. Okonkwo |
|
Computer Engineering and Intelligent Systems | Vol 4, No 6 (2013) |
Security Schemes for Hack Resilient Applications Using “SNHA” (Securing Network, Host, and Application) Service |
Abstract
PDF
|
Kamal Kulshreshtha, Ajay Sharma |
|
Computer Engineering and Intelligent Systems | Vol 5, No 2 (2014) |
Security with Evidence Using Zigbee |
Abstract
PDF
|
Mahesh Raj Urs, Badrinath K, Sharath P V |
|
Journal of Economics and Sustainable Development | Vol 4, No 2 (2013) |
Security Challenges in Nigeria and the Implications for Business Activities and Sustainable Development |
Abstract
PDF
|
I.C. Achumba, O. S. Ighomereho, M. O. M. Akpor-Robaro |
|
Journal of Economics and Sustainable Development | Vol 6, No 4 (2015) |
Security Challenges and Implications to National Stability |
Abstract
PDF
|
Paul Iregbenu, Chinecherem Uzonwanne |
|
Journal of Law, Policy and Globalization | Vol 45 (2016) |
Security of Investors’ Interest under Winding up Proceedings The Nigerian Experience |
Abstract
PDF
|
Iteshi Chioma V. |
|
Journal of Law, Policy and Globalization | Vol 60 (2017) |
Security and Crime Prevention in Under-Policed Societies: The Experiment of Community Vigilantism in Anambra State of Nigeria, West Africa |
Abstract
PDF
|
Sunday K.M. Anadi |
|
Public Policy and Administration Research | Vol 5, No 7 (2015) |
Security Votes in Nigeria: A Desideratum for Security or Recipe for Corruption* |
Abstract
PDF
|
JACOB ABIODUN DADA |
|
International Affairs and Global Strategy | Vol 14 (2013) |
Security Challenges as Threats to National Unity in Nigeria: Causes, Prevention and Treatment |
Abstract
PDF
|
CHARLES OKECHUKWU IWUNDU, BLESSING E.N. THOM-OTUYA |
|
International Affairs and Global Strategy | Vol 20 (2014) |
Security Consolidation in the Gulf of Guinea: The Need to Engage AFRICOM Better Through the SECLOMTS Model |
Abstract
PDF
|
Nicholas Okai |
|
International Affairs and Global Strategy | Vol 40 (2016) |
Security in European Union |
Abstract
PDF
|
Aleksandar Kitanovski, Marija Veljovska Kondovska, Katerina Danilova |
|
International Affairs and Global Strategy | Vol 63 (2018) |
Security Challenges of Cameroon and the Effects on France-African Relations |
Abstract
PDF
|
Agberndifor Evaristus, Filiz Katman |
|
International Affairs and Global Strategy | Vol 85 (2020) |
Security and Stability of the Gulf Region in Light of Iranian Threats |
Abstract
PDF
|
Hani Mefleh O. Hamdon, Barjas Habbas Alkumeet, Sayel F. Alserhan |
|
Information and Knowledge Management | Vol 3, No 10 (2013) |
Security Architecture for Tanzania Higher Learning Institutions’ Data Warehouse |
Abstract
PDF
|
Chande Kasita, Loserian .S. Laizer |
|
Information and Knowledge Management | Vol 4, No 6 (2014) |
Security of Multifactor Authentication Model to Improve Authentication Systems |
Abstract
PDF
|
Tamara Saad Mohamed |
|
Research on Humanities and Social Sciences | Vol 13, No 8 (2023) |
Security Implications of Refugees on Host Communities: Perspectives from Buduburam in the Central Region of Ghana |
Abstract
PDF
|
Joe Daah, Linus D. Nangwele, Chrispin Mwinkyogtaa Kuupiel |
|
Control Theory and Informatics | Vol 5, No 5 (2015) |
Security Analysis of WPA2 |
Abstract
PDF
|
Joseph Mwangi, Wilson Cheruiyot, Michael Kimwel |
|
Control Theory and Informatics | Vol 10 (2021) |
SECURITY AND PRIVACY METHODS IN DISTRIBUTED SYSTEMS. |
Abstract
PDF
|
Irida Gjermeni, Dudina Hoxha |
|
Control Theory and Informatics | Vol 11 (2022) |
Security of Wireless Networks |
Abstract
PDF
|
Irida Gjermeni, Jehona Hoxha |
|
Journal of Information Engineering and Applications | Vol 9, No 1 (2019) |
Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD). |
Abstract
PDF
|
Felix. C. Aguboshim, Joy. I. Udobi |
|
Journal of Information Engineering and Applications | Vol 10, No 1 (2020) |
Security Flaws in IoT Devices: Investigation and Defense Mechanisms |
Abstract
PDF
|
Olumide Kayode |
|
Journal of Information Engineering and Applications | Vol 11, No 2 (2021) |
Security Limitations with Cloud Computing: Well-defined Security Measures Using Cloud Computing |
Abstract
PDF
|
Alberta Pratt-Sensie, Gail Miles |
|
46851 - 46875 of 61953 Items |
<< < 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 > >> |