Letteratura scientifica selezionata sul tema "Security measures"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Security measures".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Security measures"
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, n. 4 (1 ottobre 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Testo completoD'souza, Jason John, e Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 giugno 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Testo completoMcCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n. 5 (maggio 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Testo completoGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar e Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, n. 2 (1 marzo 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Testo completoRushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembre 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Testo completoRushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembre 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Testo completoStanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, n. 1 (gennaio 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Testo completoWood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, n. 3 (settembre 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Testo completoLi, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (giugno 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Testo completoValera, Jasmine P., e Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, n. 7 (31 luglio 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Testo completoTesi sul tema "Security measures"
Paul, Philip Christopher. "Microelectronic security measures". Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Testo completoKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Testo completoSantos, Alvaro K. "Economic aspects of airport security measures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Testo completoKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Testo completoMohsen, Rabih. "Quantitative measures for code obfuscation security". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Testo completoCachin, Christian. "Entropy measures and unconditional security in cryptography /". [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Testo completoRastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Testo completoAcharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Testo completoAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Cioranu, Adrian Gabriel. "Facilitation versus security". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Testo completoNaude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Testo completoLibri sul tema "Security measures"
Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.
Cerca il testo completoWayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.
Cerca il testo completoHakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Cerca il testo completoParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Cerca il testo completoCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Testo completoOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Cerca il testo completoUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation e American Association of State Highway and Transportation Officials., a cura di. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Cerca il testo completoBrooksbank, David. Security manual. 7a ed. Aldershot, Hampshire, England: Gower, 1999.
Cerca il testo completoSmith, Harry. Hotel security. Springfield, Ill., U.S.A: C.C. Thomas, 1993.
Cerca il testo completoFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.
Cerca il testo completoCapitoli di libri sul tema "Security measures"
Combs, Cynthia C. "Security Measures". In Terrorism in the Twenty-First Century, 386–419. 9a ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Testo completoThompson, Eric C. "Selecting Security Measures". In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Testo completoDas, Satya P. "Security". In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Testo completoBrauner, Florian. "Acceptance of Security Measures". In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Testo completoMcLean, John. "Quantitative Measures of Security". In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Testo completoSmoke, Richard. "Crisis Control Measures". In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Testo completoMartin, Paul. "In-trust measures". In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Testo completoMartin, Paul. "Pre-trust measures". In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Testo completoBeck, Adrian, e Andrew Willis. "Existing Security Measures: An Audit". In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Testo completoCombs, Cynthia C. "Security Measures: A Frail Defense". In Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.
Testo completoAtti di convegni sul tema "Security measures"
Zheng, Xiaoxia. "Computer network security and measures". In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Testo completo"Microarchitectures undo software security measures". In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Testo completoBramson, Aaron L. "Methodology for building confidence measures". In Defense and Security, a cura di Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Testo completoGupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Testo completoGupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Testo completoLiu, Shuiyin, Yi Hong e Emanuele Viterbo. "On measures of information theoretic security". In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Testo completoChaudhry, Yuvraj Singh, Upasana Sharma e Ajay Rana. "Enhancing Security Measures of AI Applications". In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Testo completoGong, Guo-quan, Shuang Qiang e Jun Wang. "Information security measures and regulation research". In 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.
Testo completoDadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel e B. P. Singh. "Security Measures to Protect Mobile Agents". In INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.
Testo completoSingh, Jagwinder, e Navneet Kaur. "Cloud computing: Security measures and applications". In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.
Testo completoRapporti di organizzazioni sul tema "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), febbraio 1989. http://dx.doi.org/10.2172/6137987.
Testo completoSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, maggio 1998. http://dx.doi.org/10.21236/ada345450.
Testo completoNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, febbraio 2005. http://dx.doi.org/10.21236/ada464303.
Testo completoKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, marzo 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Testo completoMinchev, Zlatogor, e Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Testo completoMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly e Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1992. http://dx.doi.org/10.21236/ada245754.
Testo completoMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, gennaio 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Testo completoMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson e Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1994. http://dx.doi.org/10.21236/ada280487.
Testo completoChristie, Lorna, e Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, agosto 2018. http://dx.doi.org/10.58248/pn584.
Testo completoHoaglund, Robert, e Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2007. http://dx.doi.org/10.21236/ada471403.
Testo completo