Full Text Available
Access Repository
Search Results - (severity OR security)
-
Women land rights and food security status of farming households in Oyo State, Nigeria
Published 2020Subjects: “…Security status…”
Article -
Women land rights and food security status of farming households in Oyo State, Nigeria
Published 2020Subjects: “…Security status…”
ArticleFull Text AvailableAccess Repository -
The impact of COVID-19 pandemic on medicine security in Africa: Nigeria as a case study
Published 2020Subjects: “…Medicine security…”
ArticleFull Text AvailableAccess Repository -
Determinants of food security status of rural households living with HIV/AIDS in Southwestern Nigeria
Published 2007ArticleFull Text AvailableAccess Repository -
An evaluationof security issues in academic libraries: the case of Kenneth Dike Library, University of Ibadan
Published 2012ArticleFull Text AvailableAccess Repository -
Productive education and economic security nexus: lessons for a labour-surplus Nigerian economy
Published 2013-03Subjects: “…Economic security…”
ArticleFull Text AvailableAccess Repository -
Determinants of Food Security Status of Rural Households Living With HIV/AIDS in Southwestern Nigeria
Published 2007Subjects: “…Food security…”
ArticleFull Text AvailableAccess Repository -
The impact of COVID-19 pandemic on medicine security in Africa: Nigeria as a case study
Published 2020Subjects: “…Medicine security…”
ArticleFull Text AvailableAccess Repository -
Innovations and Applications of Virtual Private Networks and Sustainable Security in Society 5.0 Libraries
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Enhancing Cyber Hygiene among Communities through Experiential Cyber-Security Awareness Programs
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text