Academic literature on the topic 'Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security measures"
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (October 1, 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Full textD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Full textMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (May 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Full textGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (March 1, 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Full textStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (January 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Full textWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (September 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Full textLi, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Full textValera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (July 31, 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Full textDissertations / Theses on the topic "Security measures"
Paul, Philip Christopher. "Microelectronic security measures." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Full textKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Full textSantos, Alvaro K. "Economic aspects of airport security measures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Full textKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES." UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Full textMohsen, Rabih. "Quantitative measures for code obfuscation security." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Full textCachin, Christian. "Entropy measures and unconditional security in cryptography /." [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Full textRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textAcharya, Gautam. "Legal aspects of aviation security measures taken at airports." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Full textAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Cioranu, Adrian Gabriel. "Facilitation versus security." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Full textNaude, Kevin Alexander. "Assessing program code through static structural similarity." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Full textBooks on the topic "Security measures"
Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.
Find full textWayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.
Find full textHakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Find full textParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Find full textCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Full textOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Find full textUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation, and American Association of State Highway and Transportation Officials., eds. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Find full textBrooksbank, David. Security manual. 7th ed. Aldershot, Hampshire, England: Gower, 1999.
Find full textSmith, Harry. Hotel security. Springfield, Ill., U.S.A: C.C. Thomas, 1993.
Find full textFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.
Find full textBook chapters on the topic "Security measures"
Combs, Cynthia C. "Security Measures." In Terrorism in the Twenty-First Century, 386–419. 9th ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Full textThompson, Eric C. "Selecting Security Measures." In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Full textDas, Satya P. "Security." In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Full textBrauner, Florian. "Acceptance of Security Measures." In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Full textMcLean, John. "Quantitative Measures of Security." In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Full textSmoke, Richard. "Crisis Control Measures." In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Full textMartin, Paul. "In-trust measures." In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Full textMartin, Paul. "Pre-trust measures." In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Full textBeck, Adrian, and Andrew Willis. "Existing Security Measures: An Audit." In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Full textCombs, Cynthia C. "Security Measures: A Frail Defense." In Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.
Full textConference papers on the topic "Security measures"
Zheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Full text"Microarchitectures undo software security measures." In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Full textBramson, Aaron L. "Methodology for building confidence measures." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Full textGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Full textGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Full textLiu, Shuiyin, Yi Hong, and Emanuele Viterbo. "On measures of information theoretic security." In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Full textChaudhry, Yuvraj Singh, Upasana Sharma, and Ajay Rana. "Enhancing Security Measures of AI Applications." In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Full textGong, Guo-quan, Shuang Qiang, and Jun Wang. "Information security measures and regulation research." In 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.
Full textDadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel, and B. P. Singh. "Security Measures to Protect Mobile Agents." In INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.
Full textSingh, Jagwinder, and Navneet Kaur. "Cloud computing: Security measures and applications." In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.
Full textReports on the topic "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.
Full textSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, May 1998. http://dx.doi.org/10.21236/ada345450.
Full textNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, February 2005. http://dx.doi.org/10.21236/ada464303.
Full textKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, March 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Full textMinchev, Zlatogor, and Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Full textMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly, and Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, January 1992. http://dx.doi.org/10.21236/ada245754.
Full textMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, January 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Full textMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson, and Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada280487.
Full textChristie, Lorna, and Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, August 2018. http://dx.doi.org/10.58248/pn584.
Full textHoaglund, Robert, and Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada471403.
Full text