Academic literature on the topic 'Security Components'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Components.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Components"
Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Full textMetodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.
Full textWood, Charles Cresson, and Howard M. Zeidler. "Security modules: Potent information security system components." Computers & Security 5, no. 2 (1986): 114–21. http://dx.doi.org/10.1016/0167-4048(86)90133-1.
Full textBaranovskyi, О. І., and M. O. Moroz. "INVESTMENT COMPONENTS OF FINANCIAL SECURITY." Financial and credit activity: problems of theory and practice 1, no. 22 (2017): 46–59. http://dx.doi.org/10.18371/fcaptp.v1i22.109926.
Full textFilippov, D. L. "Components of physical security risk." Issues of Risk Analysis 16, no. 4 (2019): 82–93. http://dx.doi.org/10.32686/1812-5220-2019-16-4-82-93.
Full textQun Zhong and N. Edwards. "Security control for COTS components." Computer 31, no. 6 (1998): 67–73. http://dx.doi.org/10.1109/2.683010.
Full textGanna, Smokvina, and Yankovska Olga. "Personnel security of the industrial enterprise: essence, components and measures of threats minimization." Economic journal Odessa polytechnic university 1, no. 7 (2019): 38–45. https://doi.org/10.5281/zenodo.3402729.
Full textПрядко, И. П., and С. А. Мудрак. "Food security and its main components." Экономика и предпринимательство, no. 10(123) (November 15, 2020): 1097–105. http://dx.doi.org/10.34925/eip.2020.123.10.218.
Full textHavas, Karyn, and Mo Salman. "Food security: its components and challenges." International Journal of Food Safety, Nutrition and Public Health 4, no. 1 (2011): 4. http://dx.doi.org/10.1504/ijfsnph.2011.042571.
Full textMeyer, Helen. "Security gap uncovered in ActiveX components." Computers & Security 15, no. 6 (1996): 516. http://dx.doi.org/10.1016/s0167-4048(97)83130-6.
Full textDissertations / Theses on the topic "Security Components"
Martinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.
Full textPidhrushnyi, D. O. "Scenario analysis model of economic security components." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40837.
Full textSchönefeld, Marc. "Refactoring of security antipatterns in distributed Java components." Bamberg Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.
Full textCheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.
Full textBlackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.
Full textPoxon, David Allen Louis. "Static analysis of software components for information flow security." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/226908/1/David_Poxon_Thesis.pdf.
Full textAndersson, Richard. "Evaluation of the Security of Components in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2091.
Full textYao, Ming. "A security architecture for protecting dynamic components of mobile agents." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15913/1/Ming_Yao_Thesis.pdf.
Full textYao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.
Full textSchönefeld, Marc [Verfasser]. "Refactoring of security antipatterns in distributed Java components / von Marc Schönefeld." Bamberg : Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.
Full textBooks on the topic "Security Components"
Gopal, Malviya, Centre for Security Analysis (Madras, India), University of Poona. Dept. of Defence and Strategic Studies. National Centre of International Security and Defence Analysis., and University of Madras. Dept. of Defence and Strategic Studies., eds. Essential components of national security. Centre for Security Analysis, 2007.
Find full textE, Burr William, and National Institute of Standards and Technology (U.S.), eds. Minimum interoperability specification for PKI components (MISPC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textT, Kenna B., Murray D. W, U.S. Nuclear Regulatory Commission. Office of Nuclear Material Safety and Safeguards. Division of Safeguards and Transportation., and Sandia National Laboratories, eds. Entry/exit control components for physical protection systems. Division of Safeguards and Transportation, Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, 1992.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Implementation challenges remain in securing DHS components' intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2006.
Find full textUnited States International Trade Commission. In the matter of certain vehicle security systems and components thereof. U.S. International Trade Commission, 1994.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Status report on open recommendations to DHS components. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.
Find full textUnited States International Trade Commission. In the matter of certain anti-theft deactivatable resonant tags and components thereof. U.S. International Trade Commission, 1994.
Find full textSharer, Elizabeth. Inventory Control (Known Demand): Choosing an Inventory Model for Industrial Security System Components. Edited by Hari Rajagopalan. SAGE Publications, Inc., 2024. http://dx.doi.org/10.4135/9781071974438.
Full textNkwiine, Charles. The effects of market-oriented agriculture on selected agrobiodiversity, household income, and food security components. NURRU Publications, 2004.
Find full textDivision, United States Office of Strategic Industries and Economic Security Strategic Analysis. National security assessment of the high performance explosives and explosive components industries: A report for the U.S. Department of the Navy. The Division, 2001.
Find full textBook chapters on the topic "Security Components"
Eronen, Pasi, and Jari Arkko. "Authentication Components: Engineering Experiences and Guidelines." In Security Protocols. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11861386_8.
Full textJürjens, Jan. "Model-Based Security Engineering with UML: Introducing Security Aspects." In Formal Methods for Components and Objects. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11804192_4.
Full textKhan, Khaled, Jun Han, and Yuliang Zheng. "Security Properties of Software Components." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x_6.
Full textSullivan, Daniel, Eric Luiijf, and Edward J. M. Colbert. "Components of Industrial Control Systems." In Advances in Information Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32125-7_2.
Full textChevalier, Yannick, Mohamed Anis Mekki, and Michaël Rusinowitch. "Orchestration under Security Constraints." In Formal Methods for Components and Objects. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25271-6_2.
Full textSchreck, Jörg. "Selected User Modeling Components." In Security and Privacy in User Modeling. Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_9.
Full textEronen, Pasi. "Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion)." In Security Protocols. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11861386_9.
Full textMilkevich, Andrei A. "Concept and Components of National Security." In Business 4.0 as a Subject of the Digital Economy. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90324-4_81.
Full textHerath, Pushpa. "Overview of Basic Azure Security Components." In Azure Cloud Security for Absolute Beginners. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7860-4_2.
Full textSheikh, Ahmed F. "Email, Instant Messaging, and Web Components." In CompTIA Security+ Certification Study Guide. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6234-4_12.
Full textConference papers on the topic "Security Components"
Gabštur, Peter, Martin Pollák, Marek Kočiško, and Jakub Kaščak. "Modification of Components Using Generative Design Tools." In Materials and Technologies for Defense and Security. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-7tgpug.
Full textArazi, Benjamin. "Mobile components security." In the 4th annual workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1413140.1413179.
Full textBartolac, Thomas J., and Paul L. McCarley. "Digital emulation of analog components." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.547489.
Full textFadhel, Nawfal F., Richard M. Crowder, Fatimah Akeel, and Gary B. Wills. "Component for 3D printing provenance framework: Security properties components for provenance framework." In 2014 World Congress on Internet Security (WorldCIS). IEEE, 2014. http://dx.doi.org/10.1109/worldcis.2014.7028174.
Full textHoly, Radek, Marek Kalika, and Jan Scherks. "Application of ID cards - security components." In 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS 2012). IEEE, 2012. http://dx.doi.org/10.1109/icspcs.2012.6507955.
Full textKhan, Muhammad Umair Ahmed, and Mohammad Zulkernine. "Building components with embedded security monitors." In the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS. ACM Press, 2011. http://dx.doi.org/10.1145/2000259.2000282.
Full textMarconot, Johan, Florian Pebay-Peyroula, and David Hely. "IoT Components LifeCycle Based Security Analysis." In 2017 Euromicro Conference on Digital System Design (DSD). IEEE, 2017. http://dx.doi.org/10.1109/dsd.2017.44.
Full textGuimaraes, Mario, Herb Mattord, and Richard Austin. "Incorporating security components into database courses." In the 1st annual conference. ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059535.
Full textBoryssenko, A. O. "Optimization of RF components in omnidirectional sensor." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2017. http://dx.doi.org/10.1117/12.2267704.
Full textSchonlau, William J. "Autonomous vehicle platforms from modular robotic components." In Defense and Security, edited by Grant R. Gerhart, Chuck M. Shoemaker, and Douglas W. Gage. SPIE, 2004. http://dx.doi.org/10.1117/12.564555.
Full textReports on the topic "Security Components"
Haddad, Ibrahim. Strengthening License Compliance and Software Security with SBOM Adoption: A Definitive SBOM Guide for Enterprises. The Linux Foundation, 2024. https://doi.org/10.70828/vhin7583.
Full textSouppaya, Souppaya. Workshop on Enhancing Security of Devices and Components Across the Supply Chain. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8532.ipd.
Full textRekhi, Sanjay. Workshop on Enhancing Security of Devices and Components Across the Supply Chain. National Institute of Standards and Technology, 2024. https://doi.org/10.6028/nist.ir.8532.
Full textFranusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1242462.
Full textMurdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200057.
Full textMiller, Ronald L. Nation Assistance: Does an Exercise in Guatemala by Reserve Components Support United States National Security Strategy? Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada345884.
Full textEdwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange, and Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, 2021. http://dx.doi.org/10.31979/mti.2021.1937.
Full textGrand-Clément, Sarah, and Theò Bajon. Uncrewed Ground Systems: A Primer. UNIDIR, 2022. http://dx.doi.org/10.37559/caap/22/erc/11.
Full textGrand-Clément, Sarah, and Theò Bajon. Uncrewed Maritime Systems: A Primer. UNIDIR, 2022. http://dx.doi.org/10.37559/caap/22/erc/13.
Full textTranchant, Jean-Pierre, Jessica Gordon, Jo Carpenter, et al. Bangladesh Initiative to Enhance Nutrition Security and Governance (BIeNGS) Final Evaluation Report. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.036.
Full text