Literatura científica selecionada sobre o tema "Security measures"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Security measures".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Security measures"
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, n.º 4 (1 de outubro de 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Texto completo da fonteD'souza, Jason John, e Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 de junho de 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Texto completo da fonteMcCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n.º 5 (maio de 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Texto completo da fonteGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar e Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, n.º 2 (1 de março de 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Texto completo da fonteRushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembro de 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Texto completo da fonteRushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembro de 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Texto completo da fonteStanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, n.º 1 (janeiro de 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Texto completo da fonteWood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, n.º 3 (setembro de 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Texto completo da fonteLi, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (junho de 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Texto completo da fonteValera, Jasmine P., e Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, n.º 7 (31 de julho de 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Texto completo da fonteTeses / dissertações sobre o assunto "Security measures"
Paul, Philip Christopher. "Microelectronic security measures". Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Texto completo da fonteKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Texto completo da fonteSantos, Alvaro K. "Economic aspects of airport security measures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Texto completo da fonteKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Texto completo da fonteMohsen, Rabih. "Quantitative measures for code obfuscation security". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Texto completo da fonteCachin, Christian. "Entropy measures and unconditional security in cryptography /". [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Texto completo da fonteRastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Texto completo da fonteAcharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Texto completo da fonteAviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Cioranu, Adrian Gabriel. "Facilitation versus security". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Texto completo da fonteNaude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Texto completo da fonteLivros sobre o assunto "Security measures"
Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.
Encontre o texto completo da fonteWayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.
Encontre o texto completo da fonteHakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Encontre o texto completo da fonteParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Encontre o texto completo da fonteCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Texto completo da fonteOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Encontre o texto completo da fonteUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation e American Association of State Highway and Transportation Officials., eds. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Encontre o texto completo da fonteBrooksbank, David. Security manual. 7a ed. Aldershot, Hampshire, England: Gower, 1999.
Encontre o texto completo da fonteSmith, Harry. Hotel security. Springfield, Ill., U.S.A: C.C. Thomas, 1993.
Encontre o texto completo da fonteFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Security measures"
Combs, Cynthia C. "Security Measures". In Terrorism in the Twenty-First Century, 386–419. 9a ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Texto completo da fonteThompson, Eric C. "Selecting Security Measures". In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Texto completo da fonteDas, Satya P. "Security". In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Texto completo da fonteBrauner, Florian. "Acceptance of Security Measures". In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Texto completo da fonteMcLean, John. "Quantitative Measures of Security". In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Texto completo da fonteSmoke, Richard. "Crisis Control Measures". In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Texto completo da fonteMartin, Paul. "In-trust measures". In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Texto completo da fonteMartin, Paul. "Pre-trust measures". In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Texto completo da fonteBeck, Adrian, e Andrew Willis. "Existing Security Measures: An Audit". In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Texto completo da fonteCombs, Cynthia C. "Security Measures: A Frail Defense". In Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Security measures"
Zheng, Xiaoxia. "Computer network security and measures". In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Texto completo da fonte"Microarchitectures undo software security measures". In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Texto completo da fonteBramson, Aaron L. "Methodology for building confidence measures". In Defense and Security, editado por Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Texto completo da fonteGupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Texto completo da fonteGupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Texto completo da fonteLiu, Shuiyin, Yi Hong e Emanuele Viterbo. "On measures of information theoretic security". In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Texto completo da fonteChaudhry, Yuvraj Singh, Upasana Sharma e Ajay Rana. "Enhancing Security Measures of AI Applications". In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Texto completo da fonteGong, Guo-quan, Shuang Qiang e Jun Wang. "Information security measures and regulation research". In 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.
Texto completo da fonteDadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel e B. P. Singh. "Security Measures to Protect Mobile Agents". In INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.
Texto completo da fonteSingh, Jagwinder, e Navneet Kaur. "Cloud computing: Security measures and applications". In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.
Texto completo da fonteRelatórios de organizações sobre o assunto "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), fevereiro de 1989. http://dx.doi.org/10.2172/6137987.
Texto completo da fonteSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, maio de 1998. http://dx.doi.org/10.21236/ada345450.
Texto completo da fonteNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2005. http://dx.doi.org/10.21236/ada464303.
Texto completo da fonteKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, março de 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Texto completo da fonteMinchev, Zlatogor, e Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Texto completo da fonteMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly e Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1992. http://dx.doi.org/10.21236/ada245754.
Texto completo da fonteMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, janeiro de 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Texto completo da fonteMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson e Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1994. http://dx.doi.org/10.21236/ada280487.
Texto completo da fonteChristie, Lorna, e Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, agosto de 2018. http://dx.doi.org/10.58248/pn584.
Texto completo da fonteHoaglund, Robert, e Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 2007. http://dx.doi.org/10.21236/ada471403.
Texto completo da fonte