Suggested Topics within your search.
Suggested Topics within your search.
- Security
- Management 501
- Safeguards 443
- Nuclear Disarmament, Safeguards, And Physical Protection 432
- Safety 418
- Design 366
- Monitoring 338
- General And Miscellaneous//mathematics, Computing, And Information Science 317
- Nuclear Fuel Cycle And Fuel Materials 315
- Personnel 313
- Military Technology, Weaponry, And National Defense 301
- Performance 298
- General And Miscellaneous//Mathematics, Computing, And Information Science 290
- Detection 272
- Nuclear Fuels 264
- Computers 254
- Nuclear Materials Management 248
- National Security 247
- Environmental Sciences 240
- Testing 235
- General Studies Of Nuclear Reactors 223
- Computer Networks 220
- Nevada Test Site 215
- Evaluation 209
- Maintenance 205
- Proliferation 203
- Implementation 195
- Plutonium 194
- Progress Report 191
- Energy Planning, Policy And Economy 190
-
1
Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives
Published 2019Full Text (via OSTI)
Government Document Electronic eBook -
2
Stability of Transactive Energy Market-Based Power Distribution System Under Data Integrity Attack
Published 2019Full Text (via OSTI)
Electronic eBook -
3
Sensor-fusion-based biometric identity verification
Published 1998Online Access
Government Document Electronic eBook -
4
1997 update for the applications guide to vehicle SNM monitors
Published 1997Online Access
Government Document Electronic eBook -
5
Go ahead, visit those web sites, you caǹt get hurt, can you?
Published 1997Online Access
Government Document Electronic eBook -
6
Computer-aided dispatching system design specification
Published 1997Online Access
Government Document Electronic eBook -
7
-
8
Familiar and Unfamiliar Peers as "Havens of Security" for Soviet Nursery Children
Published 1977Full Text (via ERIC)
Electronic eBook -
9
The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology
Published 1977Full Text (via ERIC)
Electronic eBook -
10
Confidentiality Methods in Educational Evaluations
Published 1977Full Text (via ERIC)
Electronic eBook -
11
-
12
Physical protection design and analysis training for the former Soviet Union
Published 1996Online Access
Government Document Electronic eBook -
13
Comparison of enclosed space detection system with conventional methods
Published 1997Online Access
Government Document Electronic eBook -
14
Governance and private investment in the Middle East and North Africa /
Published 2006Full Text (via Open Knowledge Repository)
Electronic eBook -
15
Material Protection, Accounting, and Control Technologies (MPACT) Advanced Integration Roadmap
Published 2017Online Access (via OSTI)
Government Document Electronic eBook -
16
NNSA Nuclear Smuggling Detection and Deterrence
Published 2016Online Access (via OSTI)
Government Document Electronic eBook -
17
Material Protection, Accounting, and Control Technologies (MPACT) Advanced Integration Roadmap
Published 2016Online Access (via OSTI)
Government Document Electronic eBook -
18
Nuclear Forensics at Los Alamos National Laboratory
Published 2016Online Access (via OSTI)
Government Document Electronic eBook -
19
Nuclear Security Futures Scenarios.
Published 2017Online Access (via OSTI)
Government Document Electronic eBook -
20
Off-Site Source Recovery Project Overview.
Published 2016Online Access (via OSTI)
Government Document Electronic eBook