Literatura académica sobre el tema "Security challenge"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security challenge".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Security challenge"
Streater, K. "Cyber Security Challenge". ITNOW 52, n.º 6 (1 de noviembre de 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.
Texto completoWaugh, William L. "Securing Mass Transit: A Challenge for Homeland Security". Review of Policy Research 21, n.º 3 (mayo de 2004): 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.
Texto completoFair, C. Christine. "Pakistan's Security-Governance Challenge". Current History 110, n.º 735 (1 de abril de 2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.
Texto completoSzönyi, István. "Hungary: A security challenge?" International Spectator 29, n.º 1 (enero de 1994): 89–108. http://dx.doi.org/10.1080/03932729408458041.
Texto completoKurpjuhn, Thorsten. "The SME security challenge". Computer Fraud & Security 2015, n.º 3 (marzo de 2015): 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.
Texto completoBeysenov, B. K. y A. Igisenova. "Global challenge and spiritual security". Eurasian Journal of Religious studies 2, n.º 2 (2015): 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.
Texto completoMcCluskey, B. "Connected cars - the security challenge". Engineering & Technology 12, n.º 2 (1 de marzo de 2017): 54–57. http://dx.doi.org/10.1049/et.2017.0205.
Texto completoCarroll, John E. "The Acid Challenge to Security". Bulletin of the Atomic Scientists 45, n.º 8 (octubre de 1989): 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.
Texto completoLafuente, Guillermo. "The big data security challenge". Network Security 2015, n.º 1 (enero de 2015): 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.
Texto completoEMBER, LOIS. "Diseases Pose National Security Challenge". Chemical & Engineering News 78, n.º 11 (13 de marzo de 2000): 10. http://dx.doi.org/10.1021/cen-v078n011.p010.
Texto completoTesis sobre el tema "Security challenge"
Griffiths, Jordan Luke. "Cyber security as an emerging challenge to South African national security". Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62639.
Texto completoMini Dissertation (MSS)--University of Pretoria, 2017.
Political Sciences
MSS
Unrestricted
Baldo, Martina <1996>. "Climate change: a current challenge for global security". Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19655.
Texto completoSamuel, David. "RFID security in door locks". Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Texto completoRadio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.
MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.
How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.
The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.
By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.
Keogh, Darrin M. "European security and defence policy reform : a theoretical challenge". Thesis, London Metropolitan University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507077.
Texto completoDenney, Lisa. "Thin security? : the challenge of engaging informal security actors in DFID's security sector reform programme in Sierra Leone". Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/2a246333-453e-4ee3-b714-7a53c3e9eeb7.
Texto completoSayeed, Sanjidaa. "Urbanization, Food Security and Sustainable Development: A Challenge for Bangladesh". Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-227478.
Texto completoStorer, Robert J. "U.S.-Brazil security cooperation and the challenge of technology transfer". Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41448.
Texto completoSince 2010, the United States and Brazil have made efforts to expand security cooperation between the two countries with the signing of a defense cooperation agreement, a general security of military information agreement, and the establishment of a defense cooperation dialogue. Despite these positive steps, the issue of technology transfer threatens to impede greater U.S.-Brazil security cooperation. Brazilian defense policy identifies technology transfer as a key component of its national defense, and there is a perception among many Brazilian officials that the United States is reticent to transfer defense technology to Brazil. This thesis includes an in-depth review of each country's policies and strategies related to arms and defense technology transfers, as well as case studies on cooperation (or lack thereof) between the U.S. and Brazil in two areas'nuclear and aviation'to understand what drives this belief among Brazilian policymakers. The thesis concludes that historical events in its relations with Washington make it difficult for Bras_lia to accept more recent U.S. efforts to enhance security cooperation and facilitate technology transfer on their face, while these same efforts cause U.S. policymakers to discount the importance of past indifference towards or overt efforts to block Brazil in obtaining certain technologies.
Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge". International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Texto completoAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Karlsson, Henrik. "Americas Act of Patriotism : The Challenge of Balancing Freedom and Security". Thesis, Linköping University, Department of Social and Welfare Studies, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8947.
Texto completoIn the debate generated by the authorization and reauthorization of the Patriot act we can find a wide range of opinions and ideas concerning the balance of freedom and security, and how that might affect the society. The government (the creators of the law) advocates the necessity of the Patriot act and its structural changes to secure the freedoms of USA. While opposing views suggest that these changes affect the balance of freedom and security in such a way that it might affect the way of life and be a threat to the civil liberties of the citizens. The aim of this thesis is to investigate how the debate reflects how the Patriot act may have affected the balance between the various practices of freedoms and national security in USA.
This thesis investigates three aspects of the debate that concerns the Patriot act. The rhetoric’s used in the debate by both sides show some difference in the rationales of the debating sides. Some controversial aspects of the law undermine the safeguards that are suppose to protect the civil liberties and freedoms when their definitions are opened up for a wide arrange of interpretations. The third part of the thesis investigates the big brother mentality that is being fostered and culture of preparedness of all the nation’s dimensions and systems that is asked for in order to adapt to these systematic changes of their society that the law provides.
The investigation of the debate conclude that state apparatus takes on a role of coordinative micromanaging, which together with the culture of preparedness fosters the nation to always be on its toes. As a result of these changes the practices of freedom and the democratic values they nourish are being destabilized and undermined in the climate of fear that is being established.
Gallton, Daniel A. "The Challenge of Small Satellite Systems to the Space Security Environment". Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6797.
Texto completoDuring the last two decades, technological advancements to the size and performance of electronics have fostered the development of increasingly sophisticated and smaller satellites. Small satellites, or smallsats as they are commonly referred to, have recorded data on terrestrial and space environments, served as important test beds and risk reducers for emerging space technologies, and provided important hands-on educational opportunities for industry and academia. The decreased cost and improved performance of smallsats have opened up a wide range of space missions at a fraction of the cost of larger satellite systems that would have been unfathomable two short decades ago. The proliferation of smallsat technology opens up a world of new scientific possibilities and unique security challenges as well for all space-faring nations through the potential use of smallsats as anti-satellite (ASAT) systems. This thesis examines the historical development of ASAT systems for the United States, the former Soviet Union, and China and discusses how they have influenced each nations space policy. Finally, this thesis will address current efforts to mitigate space weapons, review the implications of smallsat technology development on current space policy, and suggest courses of action to mitigate this emerging space security dilemma.
Libros sobre el tema "Security challenge"
G, Jacobsen C. y Canadian Pugwash Group, eds. World security: The new challenge. Toronto, Ont: Science for Peace, 1994.
Buscar texto completoProgram, CSIS International Security, ed. Civil security: Americans and the challenge of homeland security. Washington, D.C: CSIS Press, 2003.
Buscar texto completoThe Challenge of Anti-Roma Politics. New York: International Debate Education Association, 2015.
Buscar texto completoInnes, Alexandria J. Migration, Citizenship and the Challenge for Security. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969.
Texto completoAdministration, International Social Security, ed. Migration, a worldwide challenge for social security. Geneva: International Social Security Association, 1994.
Buscar texto completoXenia, Scheil-Adlung, ed. Building social security: The challenge of privatization. New Brunswick, USA: Transaction Publishers, 2001.
Buscar texto completoEnergy security: Europe's new foreign policy challenge. New York: Routledge, 2009.
Buscar texto completoKhan, Zulfiqar Ali. Pakistan's security: The challenge and the response. Lahore, Pakistan: Progressive Publishers, 1988.
Buscar texto completoMacLeod, Holly. Gender and human security: The challenge facing Canada's human security policy. St. Catharines, Ont: Brock University, Dept. of Political Science, 2002.
Buscar texto completoWarren, Aiden. New security challenges: The post 9/11 US challenge on international law. New York: Palgrave Macmillan, 2014.
Buscar texto completoCapítulos de libros sobre el tema "Security challenge"
Bang, Henrik Paul. "Security and Neoliberalism". En Foucault’s Political Challenge, 190–210. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1007/978-1-137-31411-6_10.
Texto completoKuzemko, Caroline, Michael F. Keating y Andreas Goldthau. "Energy Security". En The Global Energy Challenge, 148–68. London: Macmillan Education UK, 2016. http://dx.doi.org/10.1057/978-1-137-41008-5_8.
Texto completoViegas, Virgilio y Oben Kuyucu. "The Cybersecurity Challenge". En IT Security Controls, 1–16. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7799-7_1.
Texto completoSmith, Andrew. "Technology and International Security". En Challenge and Change, 165–93. New York: Palgrave Macmillan US, 2016. http://dx.doi.org/10.1057/978-1-137-48479-6_7.
Texto completoInnes, Alexandria J. "Performing Security, Theorizing Security". En Migration, Citizenship and the Challenge for Security, 113–38. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.
Texto completoTomic, Dusko y Eldar Saljic. "Corruption-Specific Security Challenge". En Sustainable Development and Social Responsibility—Volume 2, 41–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-32902-0_6.
Texto completoBang, Henrik Paul. "From Sovereignty to Security and Police". En Foucault’s Political Challenge, 180–89. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1007/978-1-137-31411-6_9.
Texto completoKaliski, Burt. "RSA Factoring Challenge". En Encyclopedia of Cryptography and Security, 1064–65. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_433.
Texto completoJust, Mike. "Challenge-Response Identification". En Encyclopedia of Cryptography and Security, 198–99. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_73.
Texto completoChapsos, Ioannis. "Is Maritime Security a Traditional Security Challenge?" En Advanced Sciences and Technologies for Security Applications, 59–78. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27914-5_4.
Texto completoActas de conferencias sobre el tema "Security challenge"
Fallon, Maurice. "Perception and estimation challenges for humanoid robotics: DARPA Robotics Challenge and NASA Valkyrie". En SPIE Security + Defence, editado por Edward M. Carapezza, Panos G. Datskos y Christos Tsamis. SPIE, 2016. http://dx.doi.org/10.1117/12.2246706.
Texto completoNolan, Adam, Dan Kubaki, Timothy Ross, Joshua Blackburn y Mike Bakich. "LADAR recognition challenge problem". En SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.920841.
Texto completoDowner, Kathleen y Maumita Bhattacharya. "BYOD Security: A New Business Challenge". En 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity). IEEE, 2015. http://dx.doi.org/10.1109/smartcity.2015.221.
Texto completoTsai, Rung-Ywan, Chao-Hsu Tsai, Kuen Lee, Chou-Lin Wu, Lang-Chin D. Lin, Kuo-Chung Huang, Wei-Liang Hsu et al. "Challenge of 3D LCD displays". En SPIE Defense, Security, and Sensing, editado por Bahram Javidi, Jung-Young Son, Manuel Martinez-Corral, Fumio Okano y Wolfgang Osten. SPIE, 2009. http://dx.doi.org/10.1117/12.820169.
Texto completoGorham, Brandy D., Edmund G. Zelnio, LeRoy A. Gorham y Frederick D. Garber. "A Synopsis of Challenge Problems". En SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.925073.
Texto completoToth, Susan, William Hughes, Tien Pham y Jeffrey Houser. "ARL PED efforts at enterprise challenge 2016". En SPIE Defense + Security, editado por Michael A. Kolodny y Tien Pham. SPIE, 2016. http://dx.doi.org/10.1117/12.2229481.
Texto completoArnold, Gregory, Jared L. Culbertson, Todd V. Rovito, Euvondia Barto, Mary Ann Harrison y Stephen Walls. "A baseline for the scene understanding challenge problem". En SPIE Defense + Security, editado por Ivan Kadar. SPIE, 2016. http://dx.doi.org/10.1117/12.2220419.
Texto completoMcIntire, John P., Jonathan Boston, Brandon Smith, Pete Swartz, Amy Whitney-Rawls, Julian Martinez Calderon y Jonathan Magin. "AFRL Commander's Challenge 2015: stopping the active shooter". En SPIE Defense + Security, editado por Edward M. Carapezza. SPIE, 2017. http://dx.doi.org/10.1117/12.2261418.
Texto completoAnderson, Cressel, Ben Axelrod, J. Philip Case, Jaeil Choi, Martin Engel, Gaurav Gupta, Florian Hecht et al. "Mobile manipulation: a challenge in integration". En SPIE Defense and Security Symposium, editado por Grant R. Gerhart, Douglas W. Gage y Charles M. Shoemaker. SPIE, 2008. http://dx.doi.org/10.1117/12.777329.
Texto completoFrederick, Philip A., Robert Kania, Justin Teems y Mike Del Rose. "External view of the DARPA Grand Challenge". En Defense and Security Symposium, editado por Grant R. Gerhart, Charles M. Shoemaker y Douglas W. Gage. SPIE, 2006. http://dx.doi.org/10.1117/12.668278.
Texto completoInformes sobre el tema "Security challenge"
Kan, Paul R. Mexico's 'Narco-Refugees': The Looming Challenge for U.S. National Security. Fort Belvoir, VA: Defense Technical Information Center, octubre de 2011. http://dx.doi.org/10.21236/ada552113.
Texto completoObado-Joel, Jennifer. The Challenge of State-Backed Internal Security in Nigeria: Considerations for Amotekun. RESOLVE Network, diciembre de 2020. http://dx.doi.org/10.37805/pn2020.9.ssa.
Texto completoMegan, Michael A. Force Protection and Coastal Security - A National Challenge, A Coast Guard Response. Fort Belvoir, VA: Defense Technical Information Center, febrero de 2001. http://dx.doi.org/10.21236/ada389872.
Texto completoSmith, Michael J. Security Challenge or Business Bonanza: United States Arms Transfers to the Persian Gulf. Fort Belvoir, VA: Defense Technical Information Center, abril de 2001. http://dx.doi.org/10.21236/ada393645.
Texto completoDjibo, Tahirou. African Military in National Conferences, A Challenge to National Security, A Case of Niger. Fort Belvoir, VA: Defense Technical Information Center, abril de 1993. http://dx.doi.org/10.21236/ada265094.
Texto completoKreamer, Walter H. y Jr. Terrorism in Southeast Asia: A Growing Challenge to Regional Peace, Security and U.S. Interests. Fort Belvoir, VA: Defense Technical Information Center, marzo de 2004. http://dx.doi.org/10.21236/ada423888.
Texto completoSeymour, N. A. Global Security in the Twenty First Century - The Challenge to International Organizations, Alliances and Coalitions. Fort Belvoir, VA: Defense Technical Information Center, abril de 1999. http://dx.doi.org/10.21236/ada363550.
Texto completoResearch Institute (IFPRI), International Food Policy. 2013 Global Hunger Index The challenge of hunger: Building resilience to achieve food and nutrition security. Washington, DC: International Food Policy Research Institute, 2013. http://dx.doi.org/10.2499/9780896298330.
Texto completoResearch Institute (IFPRI), International Food Policy. 2013 Global Hunger Index The challenge of hunger: Building resilience to achieve food and nutrition security. Washington, DC: International Food Policy Research Institute, 2013. http://dx.doi.org/10.2499/9780896299511.
Texto completoResearch Institute (IFPRI), International Food Policy. Global Hunger Index The challenge of hunger: Ensuring sustainable food security under land, water, and energy stresses. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896299429.
Texto completo