Gotowa bibliografia na temat „Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security"
Kumar, Ashok. "Securing the security". City 18, nr 3 (4.05.2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Pełny tekst źródłaNadler, Jerrold. "Securing social security". Washington Quarterly 22, nr 1 (marzec 1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Pełny tekst źródłaPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions". University of Michigan Journal of Law Reform, nr 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Pełny tekst źródłaAl-Fedaghi, Sabah. "Securing the Security System". International Journal of Security and Its Applications 11, nr 3 (31.03.2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Pełny tekst źródłaBrandon, William P., i Zachary Mohr. "Securing Social Security Solvency". Politics and the Life Sciences 38, nr 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Pełny tekst źródłaNissenbaum, Helen. "Where Computer Security Meets National Security1". Ethics and Information Technology 7, nr 2 (czerwiec 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Pełny tekst źródłaKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security". Australian Journal of International Affairs 72, nr 6 (15.10.2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Pełny tekst źródłaMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse". Cultural Values 3, nr 3 (lipiec 1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Pełny tekst źródłaWright, J. "Security? What security? [job security]". Engineering & Technology 4, nr 3 (14.02.2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Pełny tekst źródłaEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, nr 3 (wrzesień 2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Pełny tekst źródłaRozprawy doktorskie na temat "Security"
Telatin, Michela. "The development-security nexus and security sector reform". Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Pełny tekst źródłaMemon, Abdul Qudoos, Ali Hasan Raza i Sadia Iqbal Iqbal. "WLAN Security : WLAN Security". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Pełny tekst źródłaWLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.
This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.
We worked in a lab environment in order to configure the three different security solutions (WEP, WPA & WPA2 using IEEE 802.1X and RADIUS Server) on infrastructure mode for personnel and enterprise architecture of WLAN. For each security solution we used the backtrack as a security cracking tool, in order to break the WEP (64 and 128 bit long) security key of WLAN, make comparison between 64 and 128 bit long WEP key and also analyzed the different kind of attacks and some drawbacks of using WEP security in WLAN. In the same way configure the WPA and WPA2 (using IEEE 802.1X and RADIUS Server) security solution in infrastructure mode of WLAN and use the same security cracking tool backtrack in order to break the security of the WLAN and analyze the different attacks on the network in these architecture and drawbacks of using WPA and WPA2 Security solutions. By using IEEE 802.1X and RADIUS Server we can improve the security of the enterprise network.
In the end we come with many conclusions and suggestions that will help in order to provide better security while deploying Wireless LAN.
Opponents: Ali Murtaza & Mansoor Ahmed
Antonsson, Martin. "Securing XML Web Services : using WS-security". Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Pełny tekst źródłaForman, Peter James. "Securing natural gas : entity-attentive security research". Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Pełny tekst źródłaKonstantaras, Dimitrios, i Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Pełny tekst źródłaIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Estenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security". Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.
Pełny tekst źródłaKalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Pełny tekst źródłaThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems". Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Pełny tekst źródłaTyukala, Mkhululi. "Governing information security using organisational information security profiles". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Pełny tekst źródłaKainda, Ronald. "Usability and security of human-interactive security protocols". Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Pełny tekst źródłaKsiążki na temat "Security"
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Znajdź pełny tekst źródłaMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Znajdź pełny tekst źródłaTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Znajdź pełny tekst źródłaHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Pełny tekst źródłaMacKinnon, Lachlan M., red. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Pełny tekst źródłaDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Znajdź pełny tekst źródłaSoftware security: Building security in. Upper Saddle River, NJ: Addison-Wesley, 2006.
Znajdź pełny tekst źródłaMukute, Mutizwa, D. Mnyulwa i Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Znajdź pełny tekst źródłaJarvis, Lee, i Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Pełny tekst źródłaBourbeau, Philippe, red. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Pełny tekst źródłaCzęści książek na temat "Security"
Gjørv, Gunhild Hoogensen. "Human security, gender security, and positive security". W Positive Security, 45–68. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003296430-3.
Pełny tekst źródłaInnes, Alexandria J. "Performing Security, Theorizing Security". W Migration, Citizenship and the Challenge for Security, 113–38. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.
Pełny tekst źródłaCurtis, Bobby. "Security". W Pro Oracle GoldenGate for the DBA, 211–15. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1179-3_8.
Pełny tekst źródłaWicklund, Phil. "Security". W Practical Sitecore 8 Configuration and Strategy, 223–46. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1236-3_8.
Pełny tekst źródłaJiang, Liangjun. "Security". W iOS eCommerce App Development with Parse, 185–90. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.
Pełny tekst źródłaLake, Peter, i Paul Crowther. "Security". W Undergraduate Topics in Computer Science, 283–301. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5601-7_12.
Pełny tekst źródłaSteinmetz, Ralf, i Klara Nahrstedt. "Security". W X.media.publishing, 51–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-662-08876-0_4.
Pełny tekst źródłaSmith, Mary S. "Security". W Parking Structures, 247–65. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1577-7_6.
Pełny tekst źródłaChen, Shanzhi, Fei Qin, Bo Hu, Xi Li, Zhonglin Chen i Jiamin Liu. "Security". W SpringerBriefs in Electrical and Computer Engineering, 47–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61201-0_6.
Pełny tekst źródłaChing, Hung. "Security". W Portable Health Records in a Mobile Society, 189–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19937-1_15.
Pełny tekst źródłaStreszczenia konferencji na temat "Security"
Neville, Karen, i Philip Powell. "Securing Security through Education". W 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.
Pełny tekst źródłaLee, Changmin, Luca Zappaterra, Kwanghee Choi i Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements". W 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.
Pełny tekst źródła"Medical Image Security Using Quantum Cryptography". W InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Pełny tekst źródłaRauf, Irum, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh i Awais Rashid. "Security but not for security's sake". W ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3387940.3392230.
Pełny tekst źródłaChoudhary, Deepshikha, i Vidyavati Ramteke. "Securing SCADA : Critical infrastructure and security". W INTERNATIONAL CONFERENCE ON SUSTAINABLE MATERIALS SCIENCE, STRUCTURES, AND MANUFACTURING. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0168178.
Pełny tekst źródłaHolasova, Eva, Karel Kuchar, Radek Fujdiak, Petr Blazek i Jiri Misurec. "Security Modules for Securing Industrial Networks". W 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). IEEE, 2021. http://dx.doi.org/10.1109/cecit53797.2021.00199.
Pełny tekst źródłaPrathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha i U. M. Gopal Krishna. "Digital security for securing private information". W 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.
Pełny tekst źródłaCiuperca, Ella magdalena. "SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING". W eLSE 2012. Editura Universitara, 2012. http://dx.doi.org/10.12753/2066-026x-12-169.
Pełny tekst źródłaMadni, Ahmad Fayyaz, i Munam Ali Shah. "Security Model for Securing Data on Cloud". W 2022 17th International Conference on Emerging Technologies (ICET). IEEE, 2022. http://dx.doi.org/10.1109/icet56601.2022.10004669.
Pełny tekst źródłaFarkas, Csilla, i Michael N. Huhns. "Securing Enterprise Applications: Service-Oriented Security (SOS)". W 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services. IEEE, 2008. http://dx.doi.org/10.1109/cecandeee.2008.151.
Pełny tekst źródłaRaporty organizacyjne na temat "Security"
Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer i Fred B. Schneider. Securing BGP Using External Security Monitors. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2006. http://dx.doi.org/10.21236/ada633655.
Pełny tekst źródłaRamsey, Christopher R. Securing America's Future through Security Cooperation. Fort Belvoir, VA: Defense Technical Information Center, marzec 2013. http://dx.doi.org/10.21236/ada590220.
Pełny tekst źródłaGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Fort Belvoir, VA: Defense Technical Information Center, styczeń 2007. http://dx.doi.org/10.21236/ada465393.
Pełny tekst źródłaLevin, Timothy E., Cynthia E. Irvine i Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2004. http://dx.doi.org/10.21236/ada435861.
Pełny tekst źródłaKlingenstein, Ken, i Chris Misra. Internet2 Security Activities: The Security Fruitcake. Internet2, luty 2005. http://dx.doi.org/10.26869/ti.75.1.
Pełny tekst źródłaGodson, Roy, Richard Shultz, Querine Hanlon i Samantha Ravich. Adapting America's Security Paradigm and Security Agenda. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2010. http://dx.doi.org/10.21236/ada516785.
Pełny tekst źródłaRonis, Sheila R. Economic Security: Neglected Dimension of National Security? Fort Belvoir, VA: Defense Technical Information Center, styczeń 2011. http://dx.doi.org/10.21236/ada585192.
Pełny tekst źródłaBartock, Michael, Murugiah Souppaya, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi i Karen Scarfone. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, czerwiec 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Pełny tekst źródłaNicholas, Nancy. Global Security Overview Solving National Security Challenges. Office of Scientific and Technical Information (OSTI), czerwiec 2024. http://dx.doi.org/10.2172/2373128.
Pełny tekst źródłaPrasad, Dr Anand R. Cyber Security. Denmark: River Publishers, czerwiec 2016. http://dx.doi.org/10.13052/popcas005.
Pełny tekst źródła