Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security measures“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security measures" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security measures"
Dr. B. D. Karhad, Dr B. D. Karhad. „Food Security in India: Issues and Measures“. Indian Journal of Applied Research 4, Nr. 4 (01.10.2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Der volle Inhalt der QuelleD'souza, Jason John, und Seeza Franklin. „Li-Fi Security Issues and its Measures“. International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Der volle Inhalt der QuelleMcCathie, Andy. „Internet security fears prompt IT security measures“. Network Security 2000, Nr. 5 (Mai 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Der volle Inhalt der QuelleGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar und Mohinder Singh. „Networking and Security Measures“. DESIDOC Bulletin of Information Technology 24, Nr. 2 (01.03.2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Der volle Inhalt der QuelleRushinek, Avi, und Sara Rushinek. „E-commerce security measures“. Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Der volle Inhalt der QuelleRushinek, Avi, und Sara Rushinek. „E-commerce security measures“. Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Der volle Inhalt der QuelleStanton, Ray. „Weighing up security measures“. Computer Fraud & Security 2006, Nr. 1 (Januar 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Der volle Inhalt der QuelleWood, Charles Cresson. „Floppy diskette security measures“. Computers & Security 4, Nr. 3 (September 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Der volle Inhalt der QuelleLi, Yan. „Network Security Protection Measures“. Advanced Materials Research 971-973 (Juni 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Der volle Inhalt der QuelleValera, Jasmine P., und Sunguk Lee. „Security Measures in Overcoming Mobile IPv6 Security Issues“. International Journal of Database Theory and Application 9, Nr. 7 (31.07.2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Der volle Inhalt der QuelleDissertationen zum Thema "Security measures"
Paul, Philip Christopher. „Microelectronic security measures“. Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Der volle Inhalt der QuelleKing-Lacroix, Justin. „Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems“. Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Der volle Inhalt der QuelleSantos, Alvaro K. „Economic aspects of airport security measures“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Der volle Inhalt der QuelleKavuluru, Ramakanth. „ANALYSIS OF SECURITY MEASURES FOR SEQUENCES“. UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Der volle Inhalt der QuelleMohsen, Rabih. „Quantitative measures for code obfuscation security“. Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Der volle Inhalt der QuelleCachin, Christian. „Entropy measures and unconditional security in cryptography /“. [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Der volle Inhalt der QuelleRastogi, Rahul. „Information security service management : a service management approach to information security management“. Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Der volle Inhalt der QuelleAcharya, Gautam. „Legal aspects of aviation security measures taken at airports“. Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Der volle Inhalt der QuelleAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Cioranu, Adrian Gabriel. „Facilitation versus security“. Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Der volle Inhalt der QuelleNaude, Kevin Alexander. „Assessing program code through static structural similarity“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Der volle Inhalt der QuelleBücher zum Thema "Security measures"
Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.
Den vollen Inhalt der Quelle findenWayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.
Den vollen Inhalt der Quelle findenHakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Den vollen Inhalt der Quelle findenParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Den vollen Inhalt der Quelle findenCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Der volle Inhalt der QuelleOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Den vollen Inhalt der Quelle findenUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation und American Association of State Highway and Transportation Officials., Hrsg. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Den vollen Inhalt der Quelle findenBrooksbank, David. Security manual. 7. Aufl. Aldershot, Hampshire, England: Gower, 1999.
Den vollen Inhalt der Quelle findenSmith, Harry. Hotel security. Springfield, Ill., U.S.A: C.C. Thomas, 1993.
Den vollen Inhalt der Quelle findenFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security measures"
Combs, Cynthia C. „Security Measures“. In Terrorism in the Twenty-First Century, 386–419. 9. Aufl. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Der volle Inhalt der QuelleThompson, Eric C. „Selecting Security Measures“. In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Der volle Inhalt der QuelleDas, Satya P. „Security“. In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Der volle Inhalt der QuelleBrauner, Florian. „Acceptance of Security Measures“. In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Der volle Inhalt der QuelleMcLean, John. „Quantitative Measures of Security“. In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Der volle Inhalt der QuelleSmoke, Richard. „Crisis Control Measures“. In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Der volle Inhalt der QuelleMartin, Paul. „In-trust measures“. In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Der volle Inhalt der QuelleMartin, Paul. „Pre-trust measures“. In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Der volle Inhalt der QuelleBeck, Adrian, und Andrew Willis. „Existing Security Measures: An Audit“. In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Der volle Inhalt der QuelleCombs, Cynthia C. „Security Measures: A Frail Defense“. In Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security measures"
Zheng, Xiaoxia. „Computer network security and measures“. In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Der volle Inhalt der Quelle„Microarchitectures undo software security measures“. In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Der volle Inhalt der QuelleBramson, Aaron L. „Methodology for building confidence measures“. In Defense and Security, herausgegeben von Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Der volle Inhalt der QuelleGupta, Sanyuj Singh, Abha Thakral und Tanupriya Choudhury. „Social Media Security Analysis of Threats and Security Measures“. In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Der volle Inhalt der QuelleGupta, Sanyuj Singh, Abha Thakral und Tanupriya Choudhury. „Social Media Security Analysis of Threats and Security Measures“. In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Der volle Inhalt der QuelleLiu, Shuiyin, Yi Hong und Emanuele Viterbo. „On measures of information theoretic security“. In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Der volle Inhalt der QuelleChaudhry, Yuvraj Singh, Upasana Sharma und Ajay Rana. „Enhancing Security Measures of AI Applications“. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Der volle Inhalt der QuelleGong, Guo-quan, Shuang Qiang und Jun Wang. „Information security measures and regulation research“. In 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.
Der volle Inhalt der QuelleDadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel und B. P. Singh. „Security Measures to Protect Mobile Agents“. In INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.
Der volle Inhalt der QuelleSingh, Jagwinder, und Navneet Kaur. „Cloud computing: Security measures and applications“. In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), Februar 1989. http://dx.doi.org/10.2172/6137987.
Der volle Inhalt der QuelleSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, Mai 1998. http://dx.doi.org/10.21236/ada345450.
Der volle Inhalt der QuelleNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, Februar 2005. http://dx.doi.org/10.21236/ada464303.
Der volle Inhalt der QuelleKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, März 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Der volle Inhalt der QuelleMinchev, Zlatogor, und Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Der volle Inhalt der QuelleMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly und Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, Januar 1992. http://dx.doi.org/10.21236/ada245754.
Der volle Inhalt der QuelleMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, Januar 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Der volle Inhalt der QuelleMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson und Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, Januar 1994. http://dx.doi.org/10.21236/ada280487.
Der volle Inhalt der QuelleChristie, Lorna, und Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, August 2018. http://dx.doi.org/10.58248/pn584.
Der volle Inhalt der QuelleHoaglund, Robert, und Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, Januar 2007. http://dx.doi.org/10.21236/ada471403.
Der volle Inhalt der Quelle