Literatura académica sobre el tema "Security measures"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security measures".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Security measures"
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, n.º 4 (1 de octubre de 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Texto completoD'souza, Jason John y Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 de junio de 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Texto completoMcCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n.º 5 (mayo de 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Texto completoGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar y Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, n.º 2 (1 de marzo de 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Texto completoRushinek, Avi y Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (noviembre de 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Texto completoRushinek, Avi y Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (noviembre de 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Texto completoStanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, n.º 1 (enero de 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Texto completoWood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, n.º 3 (septiembre de 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Texto completoLi, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (junio de 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Texto completoValera, Jasmine P. y Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, n.º 7 (31 de julio de 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Texto completoTesis sobre el tema "Security measures"
Paul, Philip Christopher. "Microelectronic security measures". Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Texto completoKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Texto completoSantos, Alvaro K. "Economic aspects of airport security measures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Texto completoKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Texto completoMohsen, Rabih. "Quantitative measures for code obfuscation security". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Texto completoCachin, Christian. "Entropy measures and unconditional security in cryptography /". [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Texto completoRastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Texto completoAcharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Texto completoAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Cioranu, Adrian Gabriel. "Facilitation versus security". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Texto completoNaude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Texto completoLibros sobre el tema "Security measures"
Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.
Buscar texto completoWayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.
Buscar texto completoHakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Buscar texto completoParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Buscar texto completoCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Texto completoOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Buscar texto completoUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation y American Association of State Highway and Transportation Officials., eds. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Buscar texto completoBrooksbank, David. Security manual. 7a ed. Aldershot, Hampshire, England: Gower, 1999.
Buscar texto completoSmith, Harry. Hotel security. Springfield, Ill., U.S.A: C.C. Thomas, 1993.
Buscar texto completoFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.
Buscar texto completoCapítulos de libros sobre el tema "Security measures"
Combs, Cynthia C. "Security Measures". En Terrorism in the Twenty-First Century, 386–419. 9a ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Texto completoThompson, Eric C. "Selecting Security Measures". En Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Texto completoDas, Satya P. "Security". En Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Texto completoBrauner, Florian. "Acceptance of Security Measures". En Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Texto completoMcLean, John. "Quantitative Measures of Security". En Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Texto completoSmoke, Richard. "Crisis Control Measures". En Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Texto completoMartin, Paul. "In-trust measures". En Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Texto completoMartin, Paul. "Pre-trust measures". En Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Texto completoBeck, Adrian y Andrew Willis. "Existing Security Measures: An Audit". En Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Texto completoCombs, Cynthia C. "Security Measures: A Frail Defense". En Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.
Texto completoActas de conferencias sobre el tema "Security measures"
Zheng, Xiaoxia. "Computer network security and measures". En Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Texto completo"Microarchitectures undo software security measures". En 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Texto completoBramson, Aaron L. "Methodology for building confidence measures". En Defense and Security, editado por Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Texto completoGupta, Sanyuj Singh, Abha Thakral y Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". En 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Texto completoGupta, Sanyuj Singh, Abha Thakral y Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". En 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Texto completoLiu, Shuiyin, Yi Hong y Emanuele Viterbo. "On measures of information theoretic security". En 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Texto completoChaudhry, Yuvraj Singh, Upasana Sharma y Ajay Rana. "Enhancing Security Measures of AI Applications". En 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Texto completoGong, Guo-quan, Shuang Qiang y Jun Wang. "Information security measures and regulation research". En 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.
Texto completoDadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel y B. P. Singh. "Security Measures to Protect Mobile Agents". En INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.
Texto completoSingh, Jagwinder y Navneet Kaur. "Cloud computing: Security measures and applications". En ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.
Texto completoInformes sobre el tema "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), febrero de 1989. http://dx.doi.org/10.2172/6137987.
Texto completoSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, mayo de 1998. http://dx.doi.org/10.21236/ada345450.
Texto completoNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, febrero de 2005. http://dx.doi.org/10.21236/ada464303.
Texto completoKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, marzo de 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Texto completoMinchev, Zlatogor y Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Texto completoMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly y Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, enero de 1992. http://dx.doi.org/10.21236/ada245754.
Texto completoMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, enero de 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Texto completoMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson y Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, enero de 1994. http://dx.doi.org/10.21236/ada280487.
Texto completoChristie, Lorna y Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, agosto de 2018. http://dx.doi.org/10.58248/pn584.
Texto completoHoaglund, Robert y Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, enero de 2007. http://dx.doi.org/10.21236/ada471403.
Texto completo