Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Portland Public Library.
The Resource
Security measures
Resource Information
The topic Security measures represents a specific aggregation or gathering of resources found in Portland Public Library.
- Label
- Security measures
422 Items that are about the Topic Security measures
Context
Context of Security measuresFocus of
Subfocus of
No resources found
No enriched resources found
- Administrative agencies -- Data processing | Security measures -- United States
- Administrative agencies -- Information technology | Security measures -- United States
- Aeronautics -- Security measures
- Aeronautics -- Security measures -- United States
- Aeronautics -- Security measures -- United States -- Management | Evaluation
- Aeronautics, Commercial -- Freight | Security measures
- Aeronautics, Commercial -- Freight | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures -- United States
- Aeronautics, Commercial -- Passenger traffic | Security measures | Technological innovations -- United States -- Costs
- Aeronautics, Commercial -- Security measures
- Aeronautics, Commercial -- Security measures -- California | Los Angeles
- Aeronautics, Commercial -- Security measures -- Pacific Area
- Aeronautics, Commercial -- Security measures -- United States
- Aeronautics, Commercial -- Security measures -- United States -- Finance
- Aeronautics, Commercial -- Security measures -- United States -- Management
- Aeronautics, Commercial -- Security measures -- United States -- Planning
- Aeronautics, Commercial -- Security measures | Equipment and supplies
- Aeronautics, Commercial -- Security measures | Government policy -- United States
- Aeronautics, Commercial -- Security measures | International cooperation
- Aeronautics, Commercial -- Security measures | Law and legislation
- Aeronautics, Commercial -- Security measures | Law and legislation -- United States
- Aeronautics, Commercial -- Security measures | Research -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States
- Aeronautics, Commercial -- Security measures | Technological innovations -- United States -- Costs
- Agriculture -- Security measures -- United States
- Airlines -- Security measures
- Airlines -- Security measures -- United States
- Airplanes -- Maintenance and repair | Security measures -- Foreign countries
- Airports -- Baggage handling | Security measures -- United States
- Airports -- Baggage handling | Security measures -- United States -- Evaluation
- Airports -- Baggage handling | Security measures | International cooperation
- Airports -- Security measures
- Airports -- Security measures -- California | Los Angeles
- Airports -- Security measures -- Cuba
- Airports -- Security measures -- Fiction
- Airports -- Security measures -- United States
- Airports -- Security measures -- United States -- Equipment and supplies
- Airports -- Security measures -- United States -- Evaluation
- Airports -- Security measures -- United States -- Finance
- Airports -- Security measures -- United States -- Testing
- Airports -- Security measures | International cooperation
- Airports -- Security measures | International cooperation
- Airports -- Security measures | Technological innovations -- United States -- Costs
- Ammonium nitrate -- Security measures -- United States
- Armed Forces -- Security measures
- Boats and boating -- Security measures -- Handbooks, manuals, etc
- Broadband communication systems -- Security measures -- United States
- Building leases -- Security measures -- United States
- Buildings -- Security measures
- Buildings -- Security measures -- United States
- Bus lines -- Security measures
- Bus lines -- Security measures -- United States
- Buses -- Security measures -- United States -- Evaluation
- Business -- Data processing | Security measures
- Business -- Data processing | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Security measures -- Fiction
- Capitols -- Security measures
- Cargo handling -- Security measures
- Cargo handling -- Security measures -- United States
- Cell phone systems -- Security measures
- Chemical industry -- Security measures -- United States
- Chemical plants -- Security measures -- United States
- Chemical plants -- Security measures | Government policy -- United States
- Cloud computing -- Security measures
- Cloud computing -- Security measures -- United States
- Coasts -- Security measures -- United States
- Command and control systems -- Security measures
- Command and control systems -- Security measures -- United States
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Popular works
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States -- Evaluation
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures -- United States -- States
- Computer networks -- Security measures | Finance
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | Planning
- Computer networks -- Security measures | Technological innovations -- United States
- Computer networks -- Security measures | Vocational guidance
- Computer security -- Security measures -- United States
- Confidential business information -- Security measures
- Confidential communications -- Taxation | Security measures -- United States -- Periodicals
- Container ships -- Security measures -- United States -- Evaluation
- Container terminals -- Security measures -- United States -- Evaluation
- Containerization -- Security measures -- United States
- Corporations -- Security measures
- Corporations -- Security measures -- Drama
- Corporations -- Security measures -- Drama
- Corporations -- Security measures -- United States
- Courthouses -- Security measures -- United States -- States
- Credit cards -- Security measures | Standards -- United States -- Evaluation
- Crowds -- Security measures -- New Jersey -- Planning
- Crowds -- Security measures -- United States
- Cruise ships -- Security measures
- Cruise ships -- Security measures -- United States
- Cyberinfrastructure -- Security measures
- Cyberinfrastructure -- Security measures -- United States
- Cyberinfrastructure -- Security measures -- United States -- States
- Cyberinfrastructure -- Security measures | Government policy -- United States
- Cyberinfrastructure -- Security measures | Research -- United States
- Cyberinfrastructure -- Security measures | Technological innovations -- United States
- Cyberspace -- Security measures
- Cyberspace -- Security measures
- Cyberspace -- Security measures -- United States
- Cyberspace -- Security measures -- United States -- Management
- Cyberspace -- Security measures -- United States -- Planning
- Cyberspace -- Security measures | Government policy -- United States
- Cyberspace -- Security measures | History
- Cyberspace -- Security measures | Research -- United States
- Defense contracts -- Data processing | Security measures -- United States
- Digital communications -- Security measures -- United States
- Digital media -- Security measures
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures
- Diplomatic and consular service, American -- Buildings | Security measures -- Iraq
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya
- Diplomatic and consular service, American -- Buildings | Security measures -- Libya | Banghāzī
- Diplomatic and consular service, American -- Buildings | Security measures -- Yemen (Republic)
- Dwellings -- Security measures
- Electric power distribution -- Security measures -- United States
- Electric power distribution -- Security measures | Research -- United States
- Electric power systems -- Security measures
- Electric power systems -- Security measures -- United States
- Electric utilities -- Security measures
- Electric utilities -- Security measures -- United States
- Electric utilities -- United Stats -- Security measures
- Electronic government information -- Security measures -- United States
- Electronic systems -- Security measures -- United States
- Electronic voting -- Security measures -- United States
- Embassy buildings -- Security measures
- Embassy buildings -- Security measures -- Central African Republic
- Embassy buildings -- Security measures -- Iraq
- Embassy buildings -- Security measures | Law and legislation
- Firearms -- Security measures -- United States
- Flight training -- Security measures | Government policy -- United States
- Food supply -- Security measures -- United States
- Food supply -- Security measures | Government policy -- United States
- Freight and freightage -- Security measures
- Freight and freightage -- Security measures -- United States
- Gasoline supply -- Security measures -- United States
- Global system for mobile communications -- Security measures -- United States
- Government information -- Security measures
- Government information -- Security measures -- United States
- Government property -- Security measures
- Government property -- Security measures -- Maine
- Government property -- Security measures -- United States
- Government purchasing -- Security measures -- United States
- Harbors -- Security measures
- Harbors -- Security measures -- Florida | Miami
- Harbors -- Security measures -- Texas | Houston
- Harbors -- Security measures -- United States
- Harbors -- Security measures -- United States -- Evaluation
- Houses -- Security measures -- Fiction
- Industries -- Security measures
- Industries -- Security measures -- United States
- Information storage and retrieval systems -- Security measures | Government policy -- United States
- Information storage and retrieval systems -- Security measures | Government policy -- United States | United States
- Information superhighway -- Security measures
- Information superhighway -- Security measures -- United States
- Information technology -- Security measures
- Information technology -- Security measures
- Information technology -- Security measures -- Fiction
- Information technology -- Security measures -- United States
- Information technology -- Security measures | Government policy -- United States
- Infrastructure (Economics) -- Security measures
- Infrastructure (Economics) -- Security measures -- United States
- Infrastructure (Economics) -- Security measures | Government policy -- United States
- Insurance exchanges -- Security measures -- United States
- International airports -- Security measures
- International airports -- Security measures
- International airports -- Security measures | International cooperation
- International business enterprises -- Security measures
- International business enterprises -- Security measures -- United States
- International travel regulations -- Security measures -- United States
- Internet -- Security measures
- Internet -- Security measures
- Internet -- Security measures
- Internet -- Security measures -- Drama
- Internet -- Security measures -- Drama
- Internet -- Security measures -- United States
- Internet -- Security measures | Fiction
- Internet -- Security measures | Government policy -- United States
- Internet in medicine -- Security measures -- United States
- Internet of things -- Security measures
- Internet of things -- Security measures -- United States
- Libraries -- Security measures
- Libraries -- Security measures
- Libraries -- Security measures -- Handbooks, manuals, etc
- Libraries -- Security measures | Planning
- Libraries. -- Security measures
- Liquefied gases -- Transportation | Security measures -- United States
- Local government -- Computer networks | Security measures -- United States
- Local transit -- Security measures
- Local transit -- Security measures -- United States
- Local transit -- Security measures -- United States -- Finance
- Local transit -- Security measures | Government policy -- United States
- Logan International Airport -- Security measures -- United States
- Los Alamos National Laboratory -- Security measures
- Maine -- Capital and capitol | Security measures
- Maine State House (Augusta, Me.) -- Security measures
- Management information systems -- Security measures
- Medical care -- Information technology | Security measures -- United States
- Medical informatics -- Security measures -- United States
- Medical records -- Data processing | Security measures
- Merchant marine -- Security measures
- Merchant marine -- Security measures -- United States
- Merchant ships -- Security measures | Government policy -- United States
- Metropolitan areas -- Security measures -- United States
- Mobile communication systems -- Security measures -- United States
- National Institute of Standards and Technology (U.S.) -- Buildings | Security measures
- Natural gas pipelines -- Security measures -- United States
- Nonprofit organizations -- Security measures -- United States -- Finance
- Nuclear facilities -- Security measures
- Nuclear facilities -- Security measures -- United States
- Nuclear industry -- Security measures
- Nuclear industry -- Security measures
- Offshore structures -- Security measures
- Offshore structures -- Security measures -- United States
- Offshore structures -- Security measures | International cooperation
- Peace Corps (U.S.) -- Security measures
- Petroleum -- Transportation | Security measures -- Texas | Houston
- Pipelines -- Security measures -- United States
- Pipelines -- Security measures | Law and legislation -- United States
- Political conventions -- Security measures -- United States -- Planning
- Ports of entry -- Security measures
- Ports of entry -- Security measures -- Florida | Miami
- Ports of entry -- Security measures -- Northern boundary of the United States
- Ports of entry -- Security measures -- Texas | Houston
- Ports of entry -- Security measures -- United States
- Ports of entry -- Security measures -- United States -- Evaluation
- Ports of entry -- Security measures -- United States -- Planning
- Postal service -- Security measures
- Postal service -- Security measures -- United States
- Prisons -- Security measures
- Prisons -- Security measures
- Process control -- Security measures -- United States
- Public buildings -- Security measures
- Public buildings -- Security measures -- Maine
- Public buildings -- Security measures -- United States
- Public libraries -- Security measures
- Public libraries -- Security measures -- United States
- Radioactive substances -- Security measures -- United States
- Radioactive substances -- Security measures -- United States -- Evaluation
- Railroads -- Security measures
- Railroads -- Security measures -- United States
- Railroads -- Security measures -- United States -- Evaluation
- Religious facilities -- Security measures -- United States
- Retail trade -- Security measures
- Retail trade -- Security measures -- United States
- Roads -- Security measures -- United States
- Schools -- Security measures
- Schools -- Security measures -- United States
- Securities industry -- Security measures
- Securities industry -- Security measures
- Sewage disposal plants -- Security measures -- United States
- Shipping -- Security measures
- Shipping -- Security measures -- United States
- Shipping -- Security measures -- United States -- Evaluation
- Ships -- Security measures
- Ships -- Security measures -- United States
- Ships -- Security measures | International cooperation
- Small business -- Computer networks | Security measures
- Small business -- Computer networks | Security measures -- United States
- Small business -- Security measures
- Small business -- Security measures -- United States
- Smart power grids -- Security measures
- Smartphones -- Security measures
- Stadiums -- Security measures
- Stadiums -- Security measures -- New Jersey | East Rutherford
- Super Bowl, 2014, East Rutherford, N.J. -- Security measures
- Supervisory control systems -- Security measures
- Supervisory control systems -- Security measures -- United States
- Tankers -- Security measures -- Texas | Houston
- Tankers -- Security measures -- United States
- Tax returns -- Security measures -- United States -- Periodicals
- Telecommunication systems -- Security measures
- Telecommunication systems -- Security measures -- United States
- Telecommunication systems -- Security measures | History
- Telecommunication systems -- Security measures | History
- Telephone companies -- Security measures | History
- Telephone companies -- Security measures | History
- Telephone systems -- Security measures
- Telephone systems -- Security measures | History
- Telephone systems -- Security measures | History
- Transportation -- Security measures
- Transportation -- Security measures -- United States
- Transportation -- Security measures -- United States -- Evaluation
- Transportation -- Security measures -- United States -- Finance
- Transportation -- Security measures -- United States -- Management
- Transportation -- Security measures -- United States -- States | Finance
- Transportation -- Security measures | Government policy -- United States
- Transportation -- Security measures | Technological innovations -- United States
- Tribal government -- Computer networks | Security measures -- United States
- Trucking -- Security measures
- Trucking -- Security measures -- United States
- Trucking -- Security measures -- United States -- Evaluation
- United States -- Boundaries | Security measures -- Canada
- United States -- Boundaries | Security measures -- Mexico
- United States -- Commerce | Security measures
- United States Capitol Complex (Washington, D.C.) -- Security measures
- United States, Army -- Security measures -- Drama
- United States, Army -- Security measures -- Drama
- United States, Congress -- Security measures
- United States, Congress -- Security measures -- Periodicals
- United States, Department of Defense -- Computer networks | Security measures
- United States, Department of Homeland Security -- Information technology | Security measures
- United States, Department of Homeland Security -- Security measures
- United States, Department of State -- Security measures
- United States, Internal Revenue Service -- Computer networks | Security measures
- United States, Small Business Administration -- Security measures
- United States, Special Mission (Banghāzī, Libya) -- Security measures
- United States, Special Mission (Banghāzī, Libya) -- Security measures -- Periodicals
- United States, Surface Transportation Board -- Information technology | Security measures
- United States, Transportation Security Administration -- Security measures
- Uranium as fuel -- Security measures -- United States
- Voting -- Computer networks | Security measures -- United States
- Water-supply -- Security measures -- United States
- White House (Washington, D.C.) -- Security measures
- White House (Washington, D.C.) -- Security measures | Evaluation
- Wireless LANs -- Security measures -- Handbooks, manuals, etc
- Wireless communication systems -- Security measures
- Wireless communication systems -- Security measures -- United States
- Yachting -- Security measures -- Handbooks, manuals, etc
- Administrative agencies -- Data processing | Security measures
- Administrative agencies -- Computer networks | Security measures -- United States
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.portlandlibrary.com/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.portlandlibrary.com/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.portlandlibrary.com/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.portlandlibrary.com">Portland Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.portlandlibrary.com/resource/CIj-_sKdBsI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.portlandlibrary.com/resource/CIj-_sKdBsI/">Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.portlandlibrary.com/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.portlandlibrary.com">Portland Public Library</a></span></span></span></span></div>