Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security measures“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security measures" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security measures"
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Der volle Inhalt der QuelleRamolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.
Der volle Inhalt der QuelleMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Der volle Inhalt der QuelleDr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Der volle Inhalt der QuelleD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Der volle Inhalt der QuelleGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Der volle Inhalt der QuelleRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.
Der volle Inhalt der QuelleRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.
Der volle Inhalt der QuelleStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Der volle Inhalt der QuelleWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Der volle Inhalt der QuelleDissertationen zum Thema "Security measures"
Paul, Philip Christopher. "Microelectronic security measures." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Der volle Inhalt der QuelleKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Der volle Inhalt der QuelleSantos, Alvaro K. "Economic aspects of airport security measures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Der volle Inhalt der QuelleKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES." UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Der volle Inhalt der QuelleMohsen, Rabih. "Quantitative measures for code obfuscation security." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Der volle Inhalt der QuelleCachin, Christian. "Entropy measures and unconditional security in cryptography /." [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Der volle Inhalt der QuelleRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Der volle Inhalt der QuelleAcharya, Gautam. "Legal aspects of aviation security measures taken at airports." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Der volle Inhalt der QuelleCioranu, Adrian Gabriel. "Facilitation versus security." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Der volle Inhalt der QuelleNaude, Kevin Alexander. "Assessing program code through static structural similarity." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Der volle Inhalt der QuelleBücher zum Thema "Security measures"
Hakim, Simon. Commercial security: Burglary patterns and security measures. Security Industry Association, 1994.
Den vollen Inhalt der Quelle findenParsons, Brinckerhoff Quade &. Douglas. Transportation security. Transportation Research Board, 2006.
Den vollen Inhalt der Quelle findenCorporation, Science Applications International. Security Measures for Ferry Systems. Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Der volle Inhalt der QuelleUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., et al., eds. Transportation security. Transportation Research Board, 2006.
Den vollen Inhalt der Quelle findenFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Transportation Research Board, 2009.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security measures"
Combs, Cynthia C. "Security Measures." In Terrorism in the Twenty-First Century, 9th ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Der volle Inhalt der QuelleJohnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.
Der volle Inhalt der QuelleThompson, Eric C. "Selecting Security Measures." In Building a HIPAA-Compliant Cybersecurity Program. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Der volle Inhalt der QuelleArmstrong, Thomas E. "Risk and security." In Members, Methods, and Measures. CRC Press, 2025. https://doi.org/10.1201/9781003562160-14.
Der volle Inhalt der QuelleDas, Satya P. "Security." In Economics of Terrorism and Counter-Terrorism Measures. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Der volle Inhalt der QuelleBrauner, Florian. "Acceptance of Security Measures." In Securing Public Transportation Systems. Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Der volle Inhalt der QuelleMcLean, John. "Quantitative Measures of Security." In Dependable Computing and Fault-Tolerant Systems. Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Der volle Inhalt der QuelleMartin, Paul. "In-trust measures." In Insider Risk and Personnel Security. Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Der volle Inhalt der QuelleMartin, Paul. "Pre-trust measures." In Insider Risk and Personnel Security. Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Der volle Inhalt der QuelleSmoke, Richard. "Crisis Control Measures." In Nuclear Strategy and World Security. Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security measures"
R.Tamilkodi, Mrs.A.Harika, Mogalapalli Harika, P. Venkata Sai Abhilash, Chenagana Harish Sai, and Pranav Ps. "Enhanced Security Measures Against Phishing Threats." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810772.
Der volle Inhalt der QuelleQin, Qiu, Xu Sijia, Liu Shenglan, Xu Tianni, and Zhao Bei. "Network Virtualization Security: Threats, Measures, and Use Cases." In 2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K). IEEE, 2024. https://doi.org/10.23919/ituk62727.2024.10772977.
Der volle Inhalt der QuelleKrishna, Dondapati Manoj, Medasani Veda Pranay, and Shaik Khaja Mohiddin. "Security Measures in Cloud-Driven Home Automation Systems." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00032.
Der volle Inhalt der QuelleJyothi, V. Esther, G. Rakesh, Vipparla Aruna, Shobana Gorintla, Yalanati Ayyappa, and U. Ganesh Naidu. "Enhanced Monitoring and Security Measures with Video Analysis." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894596.
Der volle Inhalt der QuelleZheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Der volle Inhalt der Quelle"Microarchitectures undo software security measures." In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Der volle Inhalt der QuelleBramson, Aaron L. "Methodology for building confidence measures." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Der volle Inhalt der QuelleGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Der volle Inhalt der QuelleGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Der volle Inhalt der QuelleLiu, Shuiyin, Yi Hong, and Emanuele Viterbo. "On measures of information theoretic security." In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Der volle Inhalt der QuelleSantos, Ramon G. Confidence-Building Measures in Philippine Security. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada345450.
Der volle Inhalt der QuelleNathanson, David. Security and Stability Operations Measures of Effectiveness. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada464303.
Der volle Inhalt der QuelleHiraki, Ayaka. Japan’s economic security measures are immense but ineffective. East Asia Forum, 2024. https://doi.org/10.59425/eabc.1733522400.
Der volle Inhalt der QuelleKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Der volle Inhalt der QuelleMinchev, Zlatogor, and Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Der volle Inhalt der QuelleMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly, and Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada245754.
Der volle Inhalt der QuelleMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Iowa State University, 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Der volle Inhalt der QuelleMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson, and Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada280487.
Der volle Inhalt der QuelleCapper, Tim, and Alan Walker. Energy security. Parliamentary Office of Science and Technology, 2022. http://dx.doi.org/10.58248/pn676.
Der volle Inhalt der Quelle