Gotowa bibliografia na temat „Security measures”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security measures”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security measures"
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, nr 4 (1.10.2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Pełny tekst źródłaD'souza, Jason John, i Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30.06.2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Pełny tekst źródłaMcCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, nr 5 (maj 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Pełny tekst źródłaGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar i Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, nr 2 (1.03.2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Pełny tekst źródłaRushinek, Avi, i Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (listopad 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Pełny tekst źródłaRushinek, Avi, i Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (listopad 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Pełny tekst źródłaStanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, nr 1 (styczeń 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Pełny tekst źródłaWood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, nr 3 (wrzesień 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Pełny tekst źródłaLi, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (czerwiec 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Pełny tekst źródłaValera, Jasmine P., i Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, nr 7 (31.07.2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Pełny tekst źródłaRozprawy doktorskie na temat "Security measures"
Paul, Philip Christopher. "Microelectronic security measures". Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Pełny tekst źródłaKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Pełny tekst źródłaSantos, Alvaro K. "Economic aspects of airport security measures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Pełny tekst źródłaKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Pełny tekst źródłaMohsen, Rabih. "Quantitative measures for code obfuscation security". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Pełny tekst źródłaCachin, Christian. "Entropy measures and unconditional security in cryptography /". [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Pełny tekst źródłaRastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Pełny tekst źródłaAcharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Pełny tekst źródłaAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Cioranu, Adrian Gabriel. "Facilitation versus security". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Pełny tekst źródłaNaude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Pełny tekst źródłaKsiążki na temat "Security measures"
Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.
Znajdź pełny tekst źródłaWayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.
Znajdź pełny tekst źródłaHakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Znajdź pełny tekst źródłaParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Znajdź pełny tekst źródłaBerger, David L. Industrial security. Wyd. 2. Boston, Mass: Butterworth Heinemann, 1999.
Znajdź pełny tekst źródłaCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Pełny tekst źródłaOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Znajdź pełny tekst źródłaOram, Andrew. Beautiful security. Sebastopol, Calif: O'Reilly, 2009.
Znajdź pełny tekst źródłaUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation i American Association of State Highway and Transportation Officials., red. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Znajdź pełny tekst źródłaHalleen, Gary. Security monitoring with Cisco security MARS. Indianapolis, Ind: Cisco Press, 2007.
Znajdź pełny tekst źródłaCzęści książek na temat "Security measures"
Combs, Cynthia C. "Security Measures". W Terrorism in the Twenty-First Century, 386–419. Wyd. 9. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Pełny tekst źródłaThompson, Eric C. "Selecting Security Measures". W Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Pełny tekst źródłaDas, Satya P. "Security". W Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Pełny tekst źródłaBrauner, Florian. "Acceptance of Security Measures". W Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Pełny tekst źródłaMcLean, John. "Quantitative Measures of Security". W Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Pełny tekst źródłaSmoke, Richard. "Crisis Control Measures". W Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Pełny tekst źródłaMartin, Paul. "In-trust measures". W Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Pełny tekst źródłaMartin, Paul. "Pre-trust measures". W Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Pełny tekst źródłaBeck, Adrian, i Andrew Willis. "Existing Security Measures: An Audit". W Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Pełny tekst źródłaCombs, Cynthia C. "Security Measures: A Frail Defense". W Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.
Pełny tekst źródłaStreszczenia konferencji na temat "Security measures"
Zheng, Xiaoxia. "Computer network security and measures". W Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Pełny tekst źródła"Microarchitectures undo software security measures". W 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Pełny tekst źródłaBramson, Aaron L. "Methodology for building confidence measures". W Defense and Security, redaktor Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Pełny tekst źródłaGupta, Sanyuj Singh, Abha Thakral i Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". W 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Pełny tekst źródłaGupta, Sanyuj Singh, Abha Thakral i Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". W 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Pełny tekst źródłaLiu, Shuiyin, Yi Hong i Emanuele Viterbo. "On measures of information theoretic security". W 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Pełny tekst źródłaChaudhry, Yuvraj Singh, Upasana Sharma i Ajay Rana. "Enhancing Security Measures of AI Applications". W 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Pełny tekst źródłaGong, Guo-quan, Shuang Qiang i Jun Wang. "Information security measures and regulation research". W 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.
Pełny tekst źródłaDadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel i B. P. Singh. "Security Measures to Protect Mobile Agents". W INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.
Pełny tekst źródłaSingh, Jagwinder, i Navneet Kaur. "Cloud computing: Security measures and applications". W ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.
Pełny tekst źródłaRaporty organizacyjne na temat "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), luty 1989. http://dx.doi.org/10.2172/6137987.
Pełny tekst źródłaSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, maj 1998. http://dx.doi.org/10.21236/ada345450.
Pełny tekst źródłaNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, luty 2005. http://dx.doi.org/10.21236/ada464303.
Pełny tekst źródłaKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, marzec 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Pełny tekst źródłaMinchev, Zlatogor, i Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Pełny tekst źródłaMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly i Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1992. http://dx.doi.org/10.21236/ada245754.
Pełny tekst źródłaMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, styczeń 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Pełny tekst źródłaMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson i Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1994. http://dx.doi.org/10.21236/ada280487.
Pełny tekst źródłaChristie, Lorna, i Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, sierpień 2018. http://dx.doi.org/10.58248/pn584.
Pełny tekst źródłaHoaglund, Robert, i Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2007. http://dx.doi.org/10.21236/ada471403.
Pełny tekst źródła