Literatura académica sobre el tema "Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Security"
Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Texto completoNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Texto completoPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Texto completoAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Texto completoBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Texto completoNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Texto completoKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Texto completoMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Texto completoWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Texto completoEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Texto completoTesis sobre el tema "Security"
Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Texto completoMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Texto completoAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Texto completoForman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Texto completoKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Texto completoEstenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.
Texto completoKalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Texto completoHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Texto completoTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Texto completoKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Texto completoLibros sobre el tema "Security"
Poindexter, John M. Regional security, collective security, and American security. U.S. Dept. of State, Bureau of Public Affairs, 1986.
Buscar texto completoTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Springer, 2012.
Buscar texto completoJarvis, Lee, and Jack Holland. Security. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Texto completoBourbeau, Philippe, ed. Security. Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Texto completoOffice, National Preservation. Security. National Preservation Office, 1989.
Buscar texto completoChartered Institute of Public Finance and Accountancy., ed. Security. Chartered Institute of Public Finance and Accountancy, 1991.
Buscar texto completoNational Examining Board for Supervisory Management., ed. Security. 2nd ed. Pergamon Open Learning, 1991.
Buscar texto completoCapítulos de libros sobre el tema "Security"
Baghel, Vivek Singh, and Surya Prakash. "Securing Identities through Biometric Template Security." In Multimedia Security. Apple Academic Press, 2025. https://doi.org/10.1201/9781003459040-4.
Texto completoGjørv, Gunhild Hoogensen. "Human security, gender security, and positive security." In Positive Security. Routledge, 2022. http://dx.doi.org/10.4324/9781003296430-3.
Texto completoInnes, Alexandria J. "Performing Security, Theorizing Security." In Migration, Citizenship and the Challenge for Security. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.
Texto completoCurtis, Bobby. "Security." In Pro Oracle GoldenGate for the DBA. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1179-3_8.
Texto completoWicklund, Phil. "Security." In Practical Sitecore 8 Configuration and Strategy. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1236-3_8.
Texto completoJiang, Liangjun. "Security." In iOS eCommerce App Development with Parse. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.
Texto completoLake, Peter, and Paul Crowther. "Security." In Undergraduate Topics in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5601-7_12.
Texto completoSteinmetz, Ralf, and Klara Nahrstedt. "Security." In X.media.publishing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-662-08876-0_4.
Texto completoSmith, Mary S. "Security." In Parking Structures. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1577-7_6.
Texto completoChen, Shanzhi, Fei Qin, Bo Hu, Xi Li, Zhonglin Chen, and Jiamin Liu. "Security." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61201-0_6.
Texto completoActas de conferencias sobre el tema "Security"
Kothari, Sonali, Tejas Ulbhaje, Vishant Kalwani, Yash Mangale, and Pooja Bagane. "Securix: Mobile Security SDK." In 2024 19th International Workshop on Semantic and Social Media Adaptation & Personalization (SMAP). IEEE, 2024. https://doi.org/10.1109/smap63474.2024.00032.
Texto completoJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.
Texto completoTiwari, Rajni, Debasmita Mishra, Nidhi Sinha, and Biswaranjan Acharya. "Securing IoT: Emphasizing Requirements for Enhanced Device Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882398.
Texto completoNeville, Karen, and Philip Powell. "Securing Security through Education." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.
Texto completoLee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.
Texto completo"Medical Image Security Using Quantum Cryptography." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3968.
Texto completoRauf, Irum, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh, and Awais Rashid. "Security but not for security's sake." In ICSE '20: 42nd International Conference on Software Engineering. ACM, 2020. http://dx.doi.org/10.1145/3387940.3392230.
Texto completoChoudhary, Deepshikha, and Vidyavati Ramteke. "Securing SCADA : Critical infrastructure and security." In INTERNATIONAL CONFERENCE ON SUSTAINABLE MATERIALS SCIENCE, STRUCTURES, AND MANUFACTURING. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0168178.
Texto completoHolasova, Eva, Karel Kuchar, Radek Fujdiak, Petr Blazek, and Jiri Misurec. "Security Modules for Securing Industrial Networks." In 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). IEEE, 2021. http://dx.doi.org/10.1109/cecit53797.2021.00199.
Texto completoPrathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha, and U. M. Gopal Krishna. "Digital security for securing private information." In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.
Texto completoInformes sobre el tema "Security"
Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer, and Fred B. Schneider. Securing BGP Using External Security Monitors. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada633655.
Texto completoRamsey, Christopher R. Securing America's Future through Security Cooperation. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada590220.
Texto completoGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.
Texto completoLevin, Timothy E., Cynthia E. Irvine, and Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada435861.
Texto completoKlingenstein, Ken, and Chris Misra. Internet2 Security Activities: The Security Fruitcake. Internet2, 2005. http://dx.doi.org/10.26869/ti.75.1.
Texto completoGodson, Roy, Richard Shultz, Querine Hanlon, and Samantha Ravich. Adapting America's Security Paradigm and Security Agenda. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada516785.
Texto completoRonis, Sheila R. Economic Security: Neglected Dimension of National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada585192.
Texto completoBartock, Michael, Murugiah Souppaya, Jerry Wheeler, et al. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Texto completoNicholas, Nancy. Global Security Overview Solving National Security Challenges. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2373128.
Texto completoPrasad, Dr Anand R. Cyber Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas005.
Texto completo