Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security"
Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Der volle Inhalt der QuelleNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Der volle Inhalt der QuellePollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Der volle Inhalt der QuelleAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Der volle Inhalt der QuelleBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Der volle Inhalt der QuelleNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Der volle Inhalt der QuelleKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Der volle Inhalt der QuelleMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Der volle Inhalt der QuelleWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Der volle Inhalt der QuelleEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Der volle Inhalt der QuelleDissertationen zum Thema "Security"
Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Der volle Inhalt der QuelleMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Der volle Inhalt der QuelleAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Der volle Inhalt der QuelleForman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Der volle Inhalt der QuelleKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Der volle Inhalt der QuelleEstenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.
Der volle Inhalt der QuelleKalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Der volle Inhalt der QuelleHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Der volle Inhalt der QuelleTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Der volle Inhalt der QuelleKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Der volle Inhalt der QuelleBücher zum Thema "Security"
Poindexter, John M. Regional security, collective security, and American security. U.S. Dept. of State, Bureau of Public Affairs, 1986.
Den vollen Inhalt der Quelle findenMacHovec, Frank J. Security services, security science. Thomas, 1992.
Den vollen Inhalt der Quelle findenTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Springer, 2012.
Den vollen Inhalt der Quelle findenJarvis, Lee, and Jack Holland. Security. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Der volle Inhalt der QuelleBourbeau, Philippe, ed. Security. Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Der volle Inhalt der Quelle1961-, Meyers Michael, ed. Security+. McGraw-Hill/Osborne, 2003.
Den vollen Inhalt der Quelle findenOffice, National Preservation. Security. National Preservation Office, 1989.
Den vollen Inhalt der Quelle findenChartered Institute of Public Finance and Accountancy., ed. Security. Chartered Institute of Public Finance and Accountancy, 1991.
Den vollen Inhalt der Quelle findenNational Examining Board for Supervisory Management., ed. Security. 2nd ed. Pergamon Open Learning, 1991.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security"
Baghel, Vivek Singh, and Surya Prakash. "Securing Identities through Biometric Template Security." In Multimedia Security. Apple Academic Press, 2025. https://doi.org/10.1201/9781003459040-4.
Der volle Inhalt der QuelleGjørv, Gunhild Hoogensen. "Human security, gender security, and positive security." In Positive Security. Routledge, 2022. http://dx.doi.org/10.4324/9781003296430-3.
Der volle Inhalt der QuelleInnes, Alexandria J. "Performing Security, Theorizing Security." In Migration, Citizenship and the Challenge for Security. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.
Der volle Inhalt der QuelleCurtis, Bobby. "Security." In Pro Oracle GoldenGate for the DBA. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1179-3_8.
Der volle Inhalt der QuelleWicklund, Phil. "Security." In Practical Sitecore 8 Configuration and Strategy. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1236-3_8.
Der volle Inhalt der QuelleJiang, Liangjun. "Security." In iOS eCommerce App Development with Parse. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.
Der volle Inhalt der QuelleLake, Peter, and Paul Crowther. "Security." In Undergraduate Topics in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5601-7_12.
Der volle Inhalt der QuelleSteinmetz, Ralf, and Klara Nahrstedt. "Security." In X.media.publishing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-662-08876-0_4.
Der volle Inhalt der QuelleSmith, Mary S. "Security." In Parking Structures. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1577-7_6.
Der volle Inhalt der QuelleChen, Shanzhi, Fei Qin, Bo Hu, Xi Li, Zhonglin Chen, and Jiamin Liu. "Security." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61201-0_6.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security"
Kothari, Sonali, Tejas Ulbhaje, Vishant Kalwani, Yash Mangale, and Pooja Bagane. "Securix: Mobile Security SDK." In 2024 19th International Workshop on Semantic and Social Media Adaptation & Personalization (SMAP). IEEE, 2024. https://doi.org/10.1109/smap63474.2024.00032.
Der volle Inhalt der QuelleJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.
Der volle Inhalt der QuelleTiwari, Rajni, Debasmita Mishra, Nidhi Sinha, and Biswaranjan Acharya. "Securing IoT: Emphasizing Requirements for Enhanced Device Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882398.
Der volle Inhalt der QuelleNeville, Karen, and Philip Powell. "Securing Security through Education." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.
Der volle Inhalt der QuelleLee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.
Der volle Inhalt der Quelle"Medical Image Security Using Quantum Cryptography." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Der volle Inhalt der QuelleRauf, Irum, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh, and Awais Rashid. "Security but not for security's sake." In ICSE '20: 42nd International Conference on Software Engineering. ACM, 2020. http://dx.doi.org/10.1145/3387940.3392230.
Der volle Inhalt der QuelleChoudhary, Deepshikha, and Vidyavati Ramteke. "Securing SCADA : Critical infrastructure and security." In INTERNATIONAL CONFERENCE ON SUSTAINABLE MATERIALS SCIENCE, STRUCTURES, AND MANUFACTURING. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0168178.
Der volle Inhalt der QuelleHolasova, Eva, Karel Kuchar, Radek Fujdiak, Petr Blazek, and Jiri Misurec. "Security Modules for Securing Industrial Networks." In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). IEEE, 2021. http://dx.doi.org/10.1109/cecit53797.2021.00199.
Der volle Inhalt der QuellePrathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha, and U. M. Gopal Krishna. "Digital security for securing private information." In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security"
Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer, and Fred B. Schneider. Securing BGP Using External Security Monitors. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada633655.
Der volle Inhalt der QuelleRamsey, Christopher R. Securing America's Future through Security Cooperation. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada590220.
Der volle Inhalt der QuelleGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.
Der volle Inhalt der QuelleLevin, Timothy E., Cynthia E. Irvine, and Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada435861.
Der volle Inhalt der QuelleKlingenstein, Ken, and Chris Misra. Internet2 Security Activities: The Security Fruitcake. Internet2, 2005. http://dx.doi.org/10.26869/ti.75.1.
Der volle Inhalt der QuelleGodson, Roy, Richard Shultz, Querine Hanlon, and Samantha Ravich. Adapting America's Security Paradigm and Security Agenda. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada516785.
Der volle Inhalt der QuelleRonis, Sheila R. Economic Security: Neglected Dimension of National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada585192.
Der volle Inhalt der QuelleBartock, Michael, Murugiah Souppaya, Jerry Wheeler, et al. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Der volle Inhalt der QuelleNicholas, Nancy. Global Security Overview Solving National Security Challenges. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2373128.
Der volle Inhalt der QuellePrasad, Dr Anand R. Cyber Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas005.
Der volle Inhalt der Quelle