Auswahl der wissenschaftlichen Literatur zum Thema „Security“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Security"

1

Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.

Der volle Inhalt der Quelle
Annotation:
Part I of this Note addresses the restrictions on intelligence gathering under FISA prior to 9/11 and the motivations underlying the Patriot Act's revisions to FISA. Part II discusses the problems with the "primary purpose" test, which was in effect prior to the Patriot Act's revisions to FISA. Part III reviews the various policy and constitutional arguments made against the Patriot Act's "significant purpose" test. Part IV proposes that Congress enact a new "inextricably intertwined" test to govern the admission of FISA material in criminal prosecutions. Specifically, this Part looks at sixty
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Al-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Der volle Inhalt der Quelle
Annotation:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protectio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Molloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Economides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Security"

1

Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.

Der volle Inhalt der Quelle
Annotation:
The thesis investigates the link between development and security - the ‘development-security nexus’- which emerged during the 1990s, facilitated by the formulation of human development and human security. It examines how this development-security nexus has evolved over time and has influenced the interrelated significance of development and security for international relations. The thesis questions this interdependence and analyses the theory and practice that see development and security issues as reciprocally reinforcing each other, in particular through a set of policies called Security Se
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Der volle Inhalt der Quelle
Annotation:
<p>WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.</p><p>This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.</p><p>We worked in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Antonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.

Der volle Inhalt der Quelle
Annotation:
Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices h
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Der volle Inhalt der Quelle
Annotation:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Estenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.

Der volle Inhalt der Quelle
Annotation:
The purpose of this thesis is to counterargue Simon Dalby’s claim that the national security perspective should be replaced by a global security perspective. Dalby argues that the national security is inappropriate to capture the current issues regarding the environmental security. To counterargue Dalby’s claim, I represent the national security perspective by using the perspective of states’ energy security, and compare current trends and issues regarding states’ energy security and the environmental security. This is done to argue that states can either chose to enhance their own energy secu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.

Der volle Inhalt der Quelle
Annotation:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Der volle Inhalt der Quelle
Annotation:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic S
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Der volle Inhalt der Quelle
Annotation:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the fi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.

Der volle Inhalt der Quelle
Annotation:
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Security"

1

Poindexter, John M. Regional security, collective security, and American security. U.S. Dept. of State, Bureau of Public Affairs, 1986.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

MacHovec, Frank J. Security services, security science. Thomas, 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Teh, Benny Cheng Guan. Human security: Securing East Asia's future. Springer, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Jarvis, Lee, and Jack Holland. Security. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bourbeau, Philippe, ed. Security. Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

1961-, Meyers Michael, ed. Security+. McGraw-Hill/Osborne, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Office, National Preservation. Security. National Preservation Office, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chartered Institute of Public Finance and Accountancy., ed. Security. Chartered Institute of Public Finance and Accountancy, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Fleming, Neil. Security. Playwrights Guild of Canada, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

National Examining Board for Supervisory Management., ed. Security. 2nd ed. Pergamon Open Learning, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Security"

1

Baghel, Vivek Singh, and Surya Prakash. "Securing Identities through Biometric Template Security." In Multimedia Security. Apple Academic Press, 2025. https://doi.org/10.1201/9781003459040-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gjørv, Gunhild Hoogensen. "Human security, gender security, and positive security." In Positive Security. Routledge, 2022. http://dx.doi.org/10.4324/9781003296430-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Innes, Alexandria J. "Performing Security, Theorizing Security." In Migration, Citizenship and the Challenge for Security. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Curtis, Bobby. "Security." In Pro Oracle GoldenGate for the DBA. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1179-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wicklund, Phil. "Security." In Practical Sitecore 8 Configuration and Strategy. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1236-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jiang, Liangjun. "Security." In iOS eCommerce App Development with Parse. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Lake, Peter, and Paul Crowther. "Security." In Undergraduate Topics in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5601-7_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Steinmetz, Ralf, and Klara Nahrstedt. "Security." In X.media.publishing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-662-08876-0_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Smith, Mary S. "Security." In Parking Structures. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1577-7_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Chen, Shanzhi, Fei Qin, Bo Hu, Xi Li, Zhonglin Chen, and Jiamin Liu. "Security." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61201-0_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Security"

1

Kothari, Sonali, Tejas Ulbhaje, Vishant Kalwani, Yash Mangale, and Pooja Bagane. "Securix: Mobile Security SDK." In 2024 19th International Workshop on Semantic and Social Media Adaptation & Personalization (SMAP). IEEE, 2024. https://doi.org/10.1109/smap63474.2024.00032.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Tiwari, Rajni, Debasmita Mishra, Nidhi Sinha, and Biswaranjan Acharya. "Securing IoT: Emphasizing Requirements for Enhanced Device Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882398.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Neville, Karen, and Philip Powell. "Securing Security through Education." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.

Der volle Inhalt der Quelle
Annotation:
Traditionally security has been the pervasive factor in organizational growth but its importance has surpassed that of any other issue in retaining a competitive advantage. Security is, therefore, of paramount importance in the retention of organizational innovation. The key in building a secure environment lies in an organizations ability to react to changing threats both from within and external to the case. The objective of security is to protect corporate knowledge as well that of the tangible asset. It is ironic that to secure knowledge the organization must expand its knowledge of securi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

"Medical Image Security Using Quantum Cryptography." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.

Der volle Inhalt der Quelle
Annotation:
[This Proceedings paper was revised and published in the 2018 issue of the journal Issues in Informing Science and Information Technology, Volume 15] Medical images are very sensitive data that are being transferred here and there either for referral cases or consultation. Since these images are very sensitive, they have to be kept securely. Since the advent of the internet, transferring of these images is being done on the network in the form of data. Data security applications have drawn lots of interest over time. Unauthorized users daily derive ways to gain access to sensitive information
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Rauf, Irum, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh, and Awais Rashid. "Security but not for security's sake." In ICSE '20: 42nd International Conference on Software Engineering. ACM, 2020. http://dx.doi.org/10.1145/3387940.3392230.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Choudhary, Deepshikha, and Vidyavati Ramteke. "Securing SCADA : Critical infrastructure and security." In INTERNATIONAL CONFERENCE ON SUSTAINABLE MATERIALS SCIENCE, STRUCTURES, AND MANUFACTURING. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0168178.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Holasova, Eva, Karel Kuchar, Radek Fujdiak, Petr Blazek, and Jiri Misurec. "Security Modules for Securing Industrial Networks." In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). IEEE, 2021. http://dx.doi.org/10.1109/cecit53797.2021.00199.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Prathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha, and U. M. Gopal Krishna. "Digital security for securing private information." In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Security"

1

Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer, and Fred B. Schneider. Securing BGP Using External Security Monitors. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada633655.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramsey, Christopher R. Securing America's Future through Security Cooperation. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada590220.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Levin, Timothy E., Cynthia E. Irvine, and Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada435861.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Klingenstein, Ken, and Chris Misra. Internet2 Security Activities: The Security Fruitcake. Internet2, 2005. http://dx.doi.org/10.26869/ti.75.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Godson, Roy, Richard Shultz, Querine Hanlon, and Samantha Ravich. Adapting America's Security Paradigm and Security Agenda. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada516785.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ronis, Sheila R. Economic Security: Neglected Dimension of National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada585192.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bartock, Michael, Murugiah Souppaya, Jerry Wheeler, et al. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Nicholas, Nancy. Global Security Overview Solving National Security Challenges. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2373128.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Prasad, Dr Anand R. Cyber Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!