Academic literature on the topic 'Protection tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protection tools"
Lai, Jessica C., and Samuel I. Becher. "Protecting Consumer Protection." Victoria University of Wellington Law Review 49, no. 2 (2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.
Full textO. E., Rubtsov, Norkina A. N., and Chicherov K.A. "Information Protection Tools for Android-based Mobile Devices." KnE Social Sciences 3, no. 2 (2018): 235. http://dx.doi.org/10.18502/kss.v3i2.1548.
Full textTan, Raymond R. "Computational tools for environmental protection." Clean Technologies and Environmental Policy 8, no. 2 (2006): 69. http://dx.doi.org/10.1007/s10098-006-0042-y.
Full textMamanazarov, Sardor. "Methods and Tools for Personal Data Protection in Big Data: Analysis of Uzbekistan’s Legal Framework." International Journal of Law and Policy 3, no. 4 (2025): 20–40. https://doi.org/10.59022/ijlp.322.
Full textForte, Dario. "Fragmentation Attacks: Protection Tools and Techniques." Network Security 2001, no. 12 (2001): 12–13. http://dx.doi.org/10.1016/s1353-4858(01)01219-3.
Full textMcClure, Ben. "Security tools, specs offer more protection." Computers & Security 17, no. 3 (1998): 226–27. http://dx.doi.org/10.1016/s0167-4048(98)80332-5.
Full textOgilvie, E. Wendy. "LOCAL GOVERNMENT TOOLS FOR RESOURCE PROTECTION." Proceedings of the Water Environment Federation 2004, no. 4 (2004): 296–310. http://dx.doi.org/10.2175/193864704790896603.
Full textSchueler, Beth A., Stephen Balter, and Donald L. Miller. "Radiation Protection Tools in Interventional Radiology." Journal of the American College of Radiology 9, no. 11 (2012): 844–45. http://dx.doi.org/10.1016/j.jacr.2012.08.003.
Full textZomignani Barboza, Júlia, and Paul De Hert. "Data Protection Impact Assessment: A Protection Tool for Migrants Using ICT Solutions." Social Sciences 10, no. 12 (2021): 466. http://dx.doi.org/10.3390/socsci10120466.
Full textFedele, Giorgia, Federica Bove, Elisa González-Domínguez, and Vittorio Rossi. "Modelling Biocontrol Agents as Plant Protection Tools." Biology and Life Sciences Forum 4, no. 1 (2020): 75. http://dx.doi.org/10.3390/iecps2020-08631.
Full textDissertations / Theses on the topic "Protection tools"
Viking, Pontus. "Comparison of Dynamic Buffer Overflow Protection Tools." Thesis, Linköping University, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-6008.
Full textSheng, Ming. "Sizing Stream Setback Using GIS Tools for Stream Protection." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345049852.
Full textRistanovic, Dragan. "New methodology for transmission line relay testing and evaluation using advanced tools." Texas A&M University, 2003. http://hdl.handle.net/1969.1/355.
Full textMauwa, Hope. "Information security awareness: generic content, tools and techniques." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/560.
Full textIsmaïl, Mohamed Amine. "Study and optimization of data protection, bandwidth usage and simulation tools for wireless networks." Nice, 2010. http://www.theses.fr/2010NICE4074.
Full textRickard, Darcel. "Community Based Coastal Monitoring: Developing Tools For Sustainable Management." The University of Waikato, 2008. http://hdl.handle.net/10289/2247.
Full textGjeci, Alessia <1997>. "THE TOOLS FOR THE FIGHT AGAINST COUNTERFEITING AND THE PROTECTION OF PATENTS IN CHINA. THE COMPROMEC-YIAO CASE STUDY." Master's Degree Thesis, Università Ca' Foscari Venezia, 2022. http://hdl.handle.net/10579/21019.
Full textTritilanunt, Suratose. "Protocol engineering for protection against denial-of-service attacks." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26277/1/Suratose_Tritilanunt_Thesis.pdf.
Full textTritilanunt, Suratose. "Protocol engineering for protection against denial-of-service attacks." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26277/.
Full textSinkevych, Andrii. "Comparative Analysis of the Activities of the HELCOM and the Black Sea Commissions as Tools in Regional Environmental Cooperation." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-239161.
Full textBooks on the topic "Protection tools"
United States. Environmental Protection Agency. Office of Research and Development. ORD information tools. U.S. Environmental Protection Agency, Research and Development, 1987.
Find full textBaldoni, Roberto, and Gregory Chockler. Collaborative financial infrastructure protection: Tools, abstractions, and middleware. Springer, 2012.
Find full textUnited States. Congress. Office of Technology Assessment., ed. Environmental policy tools: A user's guide. Office of Technology Assessment, Congress of the U.S., 1995.
Find full textUnited States. Environmental Protection Agency. Information Access Branch. Access EPA: Public information tools. Information Access Branch, Information Management and Services Division, U.S. Environmental Protection Agency, 1991.
Find full textCecchini, Simone. Towards universal social protection: Latin American pathways and policy tools. Edited by Rossel Odriozola Cecilia editor. Economic Commission for Latin America and the Caribbean (ECLAC), 2015.
Find full textSchankerman, Mark. Damages and injunctions in the protection of proprietary research tools. National Bureau of Economic Research, 1999.
Find full textF, Zala Laszlo, and NASA Glenn Research Center, eds. Energy management control systems--tools for energy savings andenvironmental protection. National Aeronautics and Space Administration, Glenn Research Center, 2002.
Find full textJan, Kanclirz, and Baskin Brian, eds. Netcat power tools. Syngress Publishing, Inc., 2008.
Find full textJ, Baldwin, ed. Whole earth ecolog: The best of environmental tools & ideas. Harmony Books, 1990.
Find full textGrafkina, Marina. Labor protection. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1173489.
Full textBook chapters on the topic "Protection tools"
Webber, D. B. "Intellectual Property Protection for IT Developments — The Debate Continues." In Advanced IT Tools. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34979-4_16.
Full textStergiopoulos, George, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, and Dimitris Gritzalis. "Classification and Comparison of Critical Infrastructure Protection Tools." In Critical Infrastructure Protection X. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48737-3_14.
Full textKaksonen, Rauli, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, and Juha Röning. "100 Popular Open-Source Infosec Tools." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0_12.
Full textBobzin, K., W. Michaeli, N. Bagcivan, P. Immich, F. Klaiber, and S. Theiß. "Chromium Based PVD Coatings for Injection Moulding Tools." In Friction, Wear and Wear Protection. Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527628513.ch97.
Full textTamò-Larrieux, Aurelia. "Technical Tools and Designs for Data Protection." In Law, Governance and Technology Series. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98624-1_6.
Full textIshii, Shinji. "A new copyright protection scheme using the multiple RSA cryptosystems in personal cards for network shopping." In Advanced IT Tools. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34979-4_57.
Full textLaurenson, Thomas. "Performance Analysis of File Carving Tools." In Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_31.
Full textKörber, Michael, Anatoli Kalysch, Werner Massonne, and Zinaida Benenson. "Usability of Antivirus Tools in a Threat Detection Scenario." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_18.
Full textErichsen, Augusto G., Anderson L. Sartor, Jeckson D. Souza, Monica M. Pereira, Stephan Wong, and Antonio C. S. Beck. "ISA-DTMR: Selective Protection in Configurable Heterogeneous Multicores." In Applied Reconfigurable Computing. Architectures, Tools, and Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78890-6_19.
Full textKhader, I., S. Fünfschilling, A. Kailer, and R. Oberacker. "The Behavior of Silicon Nitride Tools in Hot Rolling Copper Wire." In Friction, Wear and Wear Protection. Wiley-VCH Verlag GmbH & Co. KGaA, 2011. http://dx.doi.org/10.1002/9783527628513.ch48.
Full textConference papers on the topic "Protection tools"
Zhang, Daniel. "Event Analysis: Innovative Tools and Strategies for Protection Engineers." In 2025 78th Annual Conference for Protective Relay Engineers (CFPR). IEEE, 2025. https://doi.org/10.1109/cfpr67343.2025.11013652.
Full textBalážová, Kristýna, Štěpán Galle, Anna Kandlová, and Tomáš Bendl. "AI IN ENVIRONMENTAL EDUCATION: TOOLS, TRENDS, AND FUTURE DIRECTIONS." In Public recreation and landscape protection - with respect hand in hand… Mendel University in Brno, 2025. https://doi.org/10.11118/978-80-7701-025-2-0028.
Full textPalgutová, Silvia, Kristína Pramuková, Miriama Javorská, and Ľubomír Štrba. "ONLINE TOOLS FOR GEOHERITAGE INTERPRETATION BOTH IN FORMAL AND INFORMAL EDUCATION." In Public recreation and landscape protection - with respect hand in hand… Mendel University in Brno, 2025. https://doi.org/10.11118/978-80-7701-025-2-0197.
Full textMulder, Zachary, Steve Wagner, Jared Fleming, et al. "Safeguarding Pump Stations: Ensuring Adequate Cathodic Protection with Advanced Monitoring Tools." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00559.
Full textStevens, Ken, and K. Daniel Efird. "Corrosion Protection for Bolting in Marine Environments." In CORROSION 2003. NACE International, 2003. https://doi.org/10.5006/c2003-03252.
Full textRakers, Nicole, Mary Lyn Lim, Michael McCarthy, James Begley, and Arif Mubarok. "Efficacy of Zinc Content in Sacrificial Protection of Coatings." In Coatings+ 2021. SSPC, 2021. https://doi.org/10.5006/s2021-00018.
Full textEllor, James A. "Electrostatic Modeling of Cathodic Protection Systems." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06108.
Full textYee, Geary G., and Michael R. Whitbeck. "A Microbiologically Influenced Corrosion Study in Fire Protection Systems." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04602.
Full textWhitmore, David W. "Impressed Current and Galvanic Discrete Anode Cathodic Protection for Corrosion Protection of Concrete Structures." In CORROSION 2002. NACE International, 2002. https://doi.org/10.5006/c2002-02263.
Full textBuchbach, Sascha, Peter Plagemann, and Andreas W. Momber. "Effects on the Edge Corrosion Protection Capacity of Organic Coatings." In SSPC 2011. SSPC, 2011. https://doi.org/10.5006/s2011-00051.
Full textReports on the topic "Protection tools"
Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408503.
Full textSchankerman, Mark, and Suzanne Scotchmer. Damages and Injunctions in the Protection of Proprietary Research Tools. National Bureau of Economic Research, 1999. http://dx.doi.org/10.3386/w7086.
Full textShchurenko, Anastasia. PATENT PROTECTION OF MODERN SMART TECHNOLOGIES. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3045.
Full textRoth, Stephen. The Integration of Building Information Modeling with Fire Protection Systems, Software, and Workflows. SFPE Foundation, 2024. https://doi.org/10.64167/f99p-f0cf.
Full textYam, Eileen, and Tracy McClair. Advancing Integrated Family Planning (FP)/HIV Counseling with Evidence (ADVICE): Review of FP decision support tools and HIV vulnerability assessment tools. Population Council, 2021. http://dx.doi.org/10.31899/sbsr2021.1012.
Full textWade, Colleen, Daniel Nilsson, Greg Baker, and Per Olsson. Fire Engineering Practitioner Tools: A Survey and Analysis of Needs. SFPE Foundation, 2021. https://doi.org/10.64167/a9sb-38ak.
Full textAcharya, Malhar, Ritika Divekar, Behailu Getachew, Krittika Gorur, and Joel Mumo. Can comprehensive and context-specific tools capture working conditions of CDWs for better interventions? Busara, 2024. http://dx.doi.org/10.62372/qvei1463.
Full textSett, Dominic, Florian Waldschmidt, Alvaro Rojas-Ferreira, et al. Climate and disaster risk analytics tool for adaptive social protection. United Nations University - Institute for Environment and Human Security, 2022. http://dx.doi.org/10.53324/wnsg2302.
Full textMarer, Ofir, Neili Carolina Bermudez Plaza, Alexandre Bagolle, and Luis Tejerina. Building Adaptative Social Protection Systems in Latin America and the Caribbean. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013253.
Full textRoth, Stephen. The Integration of Building Information Modeling with Fire Protection Systems, Software, and Workflows: A User Guide. SFPE Foundation, 2024. https://doi.org/10.64167/zt9s-1rs2.
Full text