Auswahl der wissenschaftlichen Literatur zum Thema „Security“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Security"

1

Kumar, Ashok. „Securing the security“. City 18, Nr. 3 (04.05.2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nadler, Jerrold. „Securing social security“. Washington Quarterly 22, Nr. 1 (März 1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pollak, William. „Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions“. University of Michigan Journal of Law Reform, Nr. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.

Der volle Inhalt der Quelle
Annotation:
Part I of this Note addresses the restrictions on intelligence gathering under FISA prior to 9/11 and the motivations underlying the Patriot Act's revisions to FISA. Part II discusses the problems with the "primary purpose" test, which was in effect prior to the Patriot Act's revisions to FISA. Part III reviews the various policy and constitutional arguments made against the Patriot Act's "significant purpose" test. Part IV proposes that Congress enact a new "inextricably intertwined" test to govern the admission of FISA material in criminal prosecutions. Specifically, this Part looks at sixty criminal cases in which FISA material was admitted and evaluates how the "inextricably intertwined" test would play out in those cases. Part V examines the arguments in favor of the inextricably intertwined test. Finally, Part VI counters the argument that the inextricably intertwined test violates the plain view doctrine.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Al-Fedaghi, Sabah. „Securing the Security System“. International Journal of Security and Its Applications 11, Nr. 3 (31.03.2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Brandon, William P., und Zachary Mohr. „Securing Social Security Solvency“. Politics and the Life Sciences 38, Nr. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Der volle Inhalt der Quelle
Annotation:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Nissenbaum, Helen. „Where Computer Security Meets National Security1“. Ethics and Information Technology 7, Nr. 2 (Juni 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kamradt-Scott, Adam. „Securing Indo-Pacific health security: Australia’s approach to regional health security“. Australian Journal of International Affairs 72, Nr. 6 (15.10.2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Molloy, Patricia. „Desiring security/securing desire: (Re)re‐thinking alterity in security discourse“. Cultural Values 3, Nr. 3 (Juli 1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wright, J. „Security? What security? [job security]“. Engineering & Technology 4, Nr. 3 (14.02.2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Economides, Spyros. „Balkan security: What security? Whose security?“ Southeast European and Black Sea Studies 3, Nr. 3 (September 2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Security"

1

Telatin, Michela. „The development-security nexus and security sector reform“. Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.

Der volle Inhalt der Quelle
Annotation:
The thesis investigates the link between development and security - the ‘development-security nexus’- which emerged during the 1990s, facilitated by the formulation of human development and human security. It examines how this development-security nexus has evolved over time and has influenced the interrelated significance of development and security for international relations. The thesis questions this interdependence and analyses the theory and practice that see development and security issues as reciprocally reinforcing each other, in particular through a set of policies called Security Sector Reform (SSR). The research includes three main areas of interest related to the different meanings of development and security focusing in particular on human development and human security; the various interpretations of the development-security nexus since the 1990s; and the analysis of how Security Sector Reform, publicised as development-security nexus policies, are designed to translate it into practice. The thesis argues that the nexus between development and security is under-theorised, and the originality of this research is to investigate the link between its theories and practices. The critical view of this thesis towards current dominant theoretical and operational orientations of the development-security nexus is based on an analysis of literature on Critical Security Studies, Post- Development, and Non-mainstream International Relations approaches. The thesis contributes to existing scholarship by unpacking the different meanings of development and security embedded in Security Sector Reform policies and reveals the need to contextualise the significance of their interlinkages within each policy scenario. In particular the three case studies on Defence Reform of Armenia, SSR Afghanistan and SSR Guinea-Bissau highlight respectively: 1) the novelty of concerns raised by SSR and the complexity to categorise concerns on security within a single, even if inclusive, policy discourse. 2) the need to go beyond the narrow view of a militarised view of security and its inadequacy to support the implementation of development objectives and 3) that the link between development and security is still very much dependent on a vision of security linked to the state’s armed forces, and of development which is focused on state security governance capacity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Memon, Abdul Qudoos, Ali Hasan Raza und Sadia Iqbal Iqbal. „WLAN Security : WLAN Security“. Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Der volle Inhalt der Quelle
Annotation:

WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.

This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.

We worked in a lab environment in order to configure the three different security solutions (WEP, WPA & WPA2 using IEEE 802.1X and RADIUS Server) on infrastructure mode for personnel and enterprise architecture of WLAN. For each security solution we used the backtrack as a security cracking tool, in order to break the WEP (64 and 128 bit long) security key of WLAN, make comparison between 64 and 128 bit long WEP key and also analyzed the different kind of attacks  and some drawbacks of using WEP security in WLAN. In the same way configure the WPA and WPA2 (using IEEE 802.1X and RADIUS Server) security solution in infrastructure mode of WLAN and use the same security cracking tool backtrack in order to break the security of the WLAN and analyze the different attacks on the network in these architecture and drawbacks of using WPA and WPA2 Security solutions. By using IEEE 802.1X and RADIUS Server we can improve the security of the enterprise network.

In the end we come with many conclusions and suggestions that will help in order to provide better security while deploying Wireless LAN.


Opponents: Ali Murtaza & Mansoor Ahmed
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Antonsson, Martin. „Securing XML Web Services : using WS-security“. Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Forman, Peter James. „Securing natural gas : entity-attentive security research“. Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.

Der volle Inhalt der Quelle
Annotation:
Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices have been developed according to the particular challenges that gas’s materiality presents. In developing this account, I make two claims. First, I argue that performances of security cannot be adequately understood without attending to the specific qualities of the circulating elements around which it is practiced. Here I build upon Dillon’s (1996) observation that security has tended to be treated as a noun that is independent of the elements that it is practiced in relation to. As a consequence, it has typically been framed as a broadly transferrable set of practices that can be more-or-less unproblematically applied to very different elements. I suggest that this abstraction has resulted in the further reduction of security into two broad practices: acts of circulatory filtration (in which risky elements are separated from flows of safe bodies, materials and things), and acts of circulatory maintenance (whereby security is performed by ensuring the continuity of particular circulations). It is my contention in this thesis that security scholars need to pay better attention to the ways in which the specific material qualities of circulating elements are generative of particular forms of securing practice. Indeed, by examining the way that security is performed around gas, I describe a series of practices that far exceed those described in accounts that present security as a matter of circulatory filtration or maintenance. My second claim is that the spaces and scales at which security is analyzed need to be expanded. I demonstrate how the critical security studies and energy security literatures have both tended to focus on security’s practice within particular nodes, at the exclusion of the performances of security (and forms of insecurity) that develop across the journeys of circulating elements; as they move between nodes. Indeed, I suggest that circulation has often been reduced in these accounts to thin, straight, and featureless lines that are largely inconsequential for performances of security. I seek to trouble this reduction, following gas as it travels through the UK gas transport infrastructures, tracing the various forms of (in)security that develop across these journeys. As a consequence of these two claims, security takes quite a different form in this account to its various depictions in the existing security literatures. I describe it as consisting of a series of ontological projects that are enacted across the lengths and breadths of gas’s circulations, and through which the material reality of natural gas is constantly (re)organised in attempts to facilitate, ‘compensate for’, and ‘cancel out’ particular kinds of perceived potential phenomena (Foucault, 2007; 36). Significantly, these performances are shown to be structured, or ‘programmed’ (Latour, 1991), through the coming together of multiple interests that pertain to a variety of heterogeneous actors and manifold referent objects. Different interests are shown to come together across gas’s journeys, and to undergo ongoing processes of negotiation that result in a variety of security performances, through which different imperatives are pursued. As such, I suggest that gas becomes ‘modulated’ (Deleuze, 1992) – it is constantly transformed from moment to moment, across the full duration of its circulatory journeys.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Konstantaras, Dimitrios, und Mustafa Tahir. „Securing Network Connected Applications with Proposed Security Models“. Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Der volle Inhalt der Quelle
Annotation:

In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.

However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security

within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.

By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.

An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Estenberg, Gabriel. „The National Security Perspective Revisited. States’ Energy Security and the Environmental Security“. Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.

Der volle Inhalt der Quelle
Annotation:
The purpose of this thesis is to counterargue Simon Dalby’s claim that the national security perspective should be replaced by a global security perspective. Dalby argues that the national security is inappropriate to capture the current issues regarding the environmental security. To counterargue Dalby’s claim, I represent the national security perspective by using the perspective of states’ energy security, and compare current trends and issues regarding states’ energy security and the environmental security. This is done to argue that states can either chose to enhance their own energy security or the environmental security. Prisoners' Dilemma is then used as a theoretical framework on an explanatory example to provide insights about a dilemma, called the Energy- Environment Dilemma in this thesis, that curbs states’ ability to commit themselves to the cause of protecting the environmental security. The explanatory example used is the strategic importance of the Northwest passage for the U.S. and Canada. The results of this thesis suggests that the national security perspective, in combination with Prisoners’ Dilemma, is useful to provide insights about the Energy-Environmental Dilemma. Replacing it with a global security perspective would be to ignore a perspective which can provide insights about a challenge for states to commit to the cause of protecting the environmental security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kalibjian, Jeff. „Securing Telemetry Post Processing Applications with Hardware Based Security“. International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.

Der volle Inhalt der Quelle
Annotation:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California
The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

He, Ying. „Generic security templates for information system security arguments : mapping security arguments within healthcare systems“. Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Der volle Inhalt der Quelle
Annotation:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic Security Template (GST), aiming to feed back the lessons learned from real world security incidents to the ISMS. It adapts graphical Goal Structuring Notations (GSN), to present the lessons learned in a structured manner through mapping them to the security requirements of the ISMS. The suitability of the GST has been confirmed by demonstrating that instances of the GST can be produced from real world security incidents of different countries based on in-depth analysis of case studies. The usability of the GST has been evaluated using a series of empirical studies. The GST is empirically evaluated in terms of its given effectiveness in assisting the communication of the lessons learned from security incidents as compared to the traditional text based approach alone. The results show that the GST can help to improve the accuracy and reduce the mental efforts in assisting the identification of the lessons learned from security incidents and the results are statistically significant. The GST is further evaluated to determine whether users can apply the GST to structure insights derived from a specific security incident. The results show that students with a computer science background can create an instance of the GST. The acceptability of the GST is assessed in a healthcare organisation. Strengths and weaknesses are identified and the GST has been adjusted to fit into organisational needs. The GST is then further tested to examine its capability to feed back the security lessons to the ISMS. The results show that, by using the GST, lessons identified from security incidents from one healthcare organisation in a specific country can be transferred to another and can indeed inform the improvements of the ISMS. In summary, the GST provides a unified way to feed back the lessons learned to the ISMS. It fosters an environment where different stakeholders can speak the same language while exchanging the lessons learned from the security incidents around the world.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Tyukala, Mkhululi. „Governing information security using organisational information security profiles“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Der volle Inhalt der Quelle
Annotation:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kainda, Ronald. „Usability and security of human-interactive security protocols“. Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.

Der volle Inhalt der Quelle
Annotation:
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical channels,and usability studies of HISPs; we follow by presenting the methodology of the research reported in this thesis. We then make a number of contributions discussing the effectiveness of empirical channels and address the design, analysis, and evaluation of these channels. In Chapter 4 we present a user study of pairwise device associations and discuss the factors affecting effective security of empirical channels in single-user scenarios. In Chapter 5 we present a user study of group device associations and discuss the factors affecting effective security of empirical channels in multi-user scenarios. In Chapter 7 we present a framework designed for researchers and system designers to reason about empirical channels in HISPs. The framework is grounded in experimental data, related research, and validated by experts. In Chapter 8 we present a methodology for analysing and evaluating the security and usability of HISPs. We validate the methodology by applying it in laboratory experiments of HISPs. Finally, in Chapter 6 we present a set of principles for designing secure and usable empirical channels. We demonstrate the effectiveness of these principles by proposing new empirical channels.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Security"

1

Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

MacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Teh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Jarvis, Lee, und Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bourbeau, Philippe, Hrsg. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

1961-, Meyers Michael, Hrsg. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Office, National Preservation. Security. London: National Preservation Office, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chartered Institute of Public Finance and Accountancy., Hrsg. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Fleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

National Examining Board for Supervisory Management., Hrsg. Security. 2. Aufl. Oxford: Pergamon Open Learning, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Security"

1

Gjørv, Gunhild Hoogensen. „Human security, gender security, and positive security“. In Positive Security, 45–68. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003296430-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Innes, Alexandria J. „Performing Security, Theorizing Security“. In Migration, Citizenship and the Challenge for Security, 113–38. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Curtis, Bobby. „Security“. In Pro Oracle GoldenGate for the DBA, 211–15. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1179-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wicklund, Phil. „Security“. In Practical Sitecore 8 Configuration and Strategy, 223–46. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1236-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Jiang, Liangjun. „Security“. In iOS eCommerce App Development with Parse, 185–90. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Lake, Peter, und Paul Crowther. „Security“. In Undergraduate Topics in Computer Science, 283–301. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5601-7_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Steinmetz, Ralf, und Klara Nahrstedt. „Security“. In X.media.publishing, 51–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-662-08876-0_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Smith, Mary S. „Security“. In Parking Structures, 247–65. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1577-7_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Chen, Shanzhi, Fei Qin, Bo Hu, Xi Li, Zhonglin Chen und Jiamin Liu. „Security“. In SpringerBriefs in Electrical and Computer Engineering, 47–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61201-0_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ching, Hung. „Security“. In Portable Health Records in a Mobile Society, 189–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19937-1_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Security"

1

Neville, Karen, und Philip Powell. „Securing Security through Education“. In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.

Der volle Inhalt der Quelle
Annotation:
Traditionally security has been the pervasive factor in organizational growth but its importance has surpassed that of any other issue in retaining a competitive advantage. Security is, therefore, of paramount importance in the retention of organizational innovation. The key in building a secure environment lies in an organizations ability to react to changing threats both from within and external to the case. The objective of security is to protect corporate knowledge as well that of the tangible asset. It is ironic that to secure knowledge the organization must expand its knowledge of security. To this end universities are currently striving to produce educational programmes to meet industrial demand for this core requirement. The amalgamation of theoretical research and industrial practice in Third level programmes is vital to ensure ongoing industrial support for academia. To this end the case under investigation strives to produce IT graduates with the ability to utilize theoretical knowledge, particularly of security, in a practitioners domain. The construction and implementation of any course is very much emergent, given the unique institutional nature of academic programmes. This paper conducts an analysis of an approach in delivering practical, as well as theoretical, knowledge of security, using a unique project to enable the learners to utilize the theoretical knowledge gained through the classroom.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Lee, Changmin, Luca Zappaterra, Kwanghee Choi und Hyeong-Ah Choi. „Securing smart home: Technologies, security challenges, and security requirements“. In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

„Medical Image Security Using Quantum Cryptography“. In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.

Der volle Inhalt der Quelle
Annotation:
[This Proceedings paper was revised and published in the 2018 issue of the journal Issues in Informing Science and Information Technology, Volume 15] Medical images are very sensitive data that are being transferred here and there either for referral cases or consultation. Since these images are very sensitive, they have to be kept securely. Since the advent of the internet, transferring of these images is being done on the network in the form of data. Data security applications have drawn lots of interest over time. Unauthorized users daily derive ways to gain access to sensitive information while application programmers continue to devise new methods of keeping information safe. One of the best ways to which data could be kept secured is through the use of cryptography. Not just Cryptography, there are new applications of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which keep transferred data safe and secure. Therefore, in this paper, a reliable and dependable way of securing medical image using Darpa Quantum Network that delivers end to end network security via high-speed Quantum Key Distribution, and testing the Network against sophisticated eavesdropping attacks is being proposed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Rauf, Irum, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh und Awais Rashid. „Security but not for security's sake“. In ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3387940.3392230.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Choudhary, Deepshikha, und Vidyavati Ramteke. „Securing SCADA : Critical infrastructure and security“. In INTERNATIONAL CONFERENCE ON SUSTAINABLE MATERIALS SCIENCE, STRUCTURES, AND MANUFACTURING. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0168178.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Holasova, Eva, Karel Kuchar, Radek Fujdiak, Petr Blazek und Jiri Misurec. „Security Modules for Securing Industrial Networks“. In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). IEEE, 2021. http://dx.doi.org/10.1109/cecit53797.2021.00199.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Prathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha und U. M. Gopal Krishna. „Digital security for securing private information“. In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ciuperca, Ella magdalena. „SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING“. In eLSE 2012. Editura Universitara, 2012. http://dx.doi.org/10.12753/2066-026x-12-169.

Der volle Inhalt der Quelle
Annotation:
Contemporary approach of the intelligence domain is due to substantial changes that the umbrella concept of security has suffered in postmodern society and to the fact that at present nations have to face an extremely diverse range of threats. Comparing with other country, traditional Romanian academic programs for studying intelligence and security are undersized. I appreciate that one of the determinants of this situation is the lack of demand for specialized security and intelligence expertise in labour market. Also the priorities of the Romanian private sector are concerned especially about profit and almost never in securing business and securing their broader community. A strong security and intelligence cultures is beneficial for any area of society; still such a culture of entrepreneurial environment can make the difference between poverty and prosperity, employment and unemployment, community inclusion or exclusion. Therefore the main reason behind educating managers resigns in the fact this category have a great social importance in society, as they are fully involved in economic development of society and linked to employment by the numbers of employees they have. Providing security and intelligence expertise in areas such as the protection of classified information, combating cross-border threats, protection against terrorism meant the medium and long term improvement of the civic behavior of everyone. But their involvement in the traditional type of education would be extremely difficult due to their responsibilities. Their lack of time can be balanced by using an e-Learning system that allows the specialization of human resources with maximum efficiency and valuable time limited. Based on the premise that one of the objectives set at European Union level is the foundation of the knowledge society, this paper constitutes an argument for implementing an e-learning platform to provide specific knowledge to substantiate the security and intelligence culture at managers' level. *This work was supported by CNCSIS-UEFISCSU, project number PN II-RU 64/2010
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Madni, Ahmad Fayyaz, und Munam Ali Shah. „Security Model for Securing Data on Cloud“. In 2022 17th International Conference on Emerging Technologies (ICET). IEEE, 2022. http://dx.doi.org/10.1109/icet56601.2022.10004669.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Farkas, Csilla, und Michael N. Huhns. „Securing Enterprise Applications: Service-Oriented Security (SOS)“. In 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services. IEEE, 2008. http://dx.doi.org/10.1109/cecandeee.2008.151.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Security"

1

Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer und Fred B. Schneider. Securing BGP Using External Security Monitors. Fort Belvoir, VA: Defense Technical Information Center, Januar 2006. http://dx.doi.org/10.21236/ada633655.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramsey, Christopher R. Securing America's Future through Security Cooperation. Fort Belvoir, VA: Defense Technical Information Center, März 2013. http://dx.doi.org/10.21236/ada590220.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Fort Belvoir, VA: Defense Technical Information Center, Januar 2007. http://dx.doi.org/10.21236/ada465393.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Levin, Timothy E., Cynthia E. Irvine und Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Fort Belvoir, VA: Defense Technical Information Center, Dezember 2004. http://dx.doi.org/10.21236/ada435861.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Klingenstein, Ken, und Chris Misra. Internet2 Security Activities: The Security Fruitcake. Internet2, Februar 2005. http://dx.doi.org/10.26869/ti.75.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Godson, Roy, Richard Shultz, Querine Hanlon und Samantha Ravich. Adapting America's Security Paradigm and Security Agenda. Fort Belvoir, VA: Defense Technical Information Center, Januar 2010. http://dx.doi.org/10.21236/ada516785.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ronis, Sheila R. Economic Security: Neglected Dimension of National Security? Fort Belvoir, VA: Defense Technical Information Center, Januar 2011. http://dx.doi.org/10.21236/ada585192.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bartock, Michael, Murugiah Souppaya, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi und Karen Scarfone. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, Juni 2021. http://dx.doi.org/10.6028/nist.ir.8320a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Nicholas, Nancy. Global Security Overview Solving National Security Challenges. Office of Scientific and Technical Information (OSTI), Juni 2024. http://dx.doi.org/10.2172/2373128.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Prasad, Dr Anand R. Cyber Security. Denmark: River Publishers, Juni 2016. http://dx.doi.org/10.13052/popcas005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie