Literatura académica sobre el tema "Security solutions"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security solutions".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Security solutions"
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Texto completoXu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Texto completoWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Texto completoGOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Texto completoNanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.
Texto completoLi, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.
Texto completoAnupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.
Texto completoKenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.
Texto completoRanjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (2022): 616–20. https://doi.org/10.5281/zenodo.6345325.
Texto completoGolchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 21–24. https://doi.org/10.70729/ijser1567.
Texto completoTesis sobre el tema "Security solutions"
Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.
Texto completoMustafa, Ali, Nasir Siddique, and Mubeen Zubair. "DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.
Texto completoAlsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.
Texto completoBailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Texto completoHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Texto completoAlexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Texto completoSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Texto completoRaza, Shahid. "Lightweight Security Solutions for the Internet of Things." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.
Texto completoHussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Texto completoLejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.
Texto completoLibros sobre el tema "Security solutions"
Mueller, John Paul. .NET Development Security Solutions. John Wiley & Sons, Ltd., 2006.
Buscar texto completoInc, NetLibrary, ed. Designing security architecture solutions. John Wiley, 2002.
Buscar texto completoAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. The Associated Chambers of Commerce and Industry of India, 2011.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. IBM, International Technical Support Organization, 2007.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. IBM, International Technical Support Organization, 2006.
Buscar texto completoSarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Texto completoMason, Andrew G. Cisco secure Internet security solutions. Cisco Press, 2001.
Buscar texto completoCapítulos de libros sobre el tema "Security solutions"
Versluis, Gerald, and Steven Thewissen. "Network and Security." In Xamarin.Forms Solutions. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.
Texto completoSchreck, Jörg. "Solutions for Security." In Security and Privacy in User Modeling. Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.
Texto completoStevens, Alex. "Implementing Security Solutions." In Enterprise Fortress. CRC Press, 2025. https://doi.org/10.1201/9781003585923-7.
Texto completoWiddowson, Amanda. "Mitigating solutions." In Humans and Cyber Security. CRC Press, 2025. https://doi.org/10.1201/9781003427681-6.
Texto completoLi, Bin, and David Zhang. "Signature Security System for E-Commerce." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.
Texto completoKhairallah, Michael. "Presenting the Solutions." In Physical Security Assessment Handbook, 2nd ed. CRC Press, 2024. http://dx.doi.org/10.4324/9781003490432-8.
Texto completoMorton, Adam. "Managing Security and Access Control." In Mastering Snowflake Solutions. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.
Texto completoMcDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman, and David C. Knox. "Security Packages." In Mastering Oracle PL/SQL: Practical Solutions. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.
Texto completoLing, Lee Luan, and Miguel Gustavo Lizárraga. "Biometrics on the Internet: Security Applications and Services." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.
Texto completoYou, Jane, and David Zhang. "Web Guard: A Biometrics Identification System for Network Security." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.
Texto completoActas de conferencias sobre el tema "Security solutions"
Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.
Texto completoAftabjahani, Sohrab, and Wilson Pradeep. "Security Verification and Secure Testing Solutions." In 2025 IEEE 43rd VLSI Test Symposium (VTS). IEEE, 2025. https://doi.org/10.1109/vts65138.2025.11022775.
Texto completoApiecionek, Łukasz. "Fuzzy Network Solutions for IoT Security." In IEEE EUROCON 2025 - 21st International Conference on Smart Technologies. IEEE, 2025. https://doi.org/10.1109/eurocon64445.2025.11073458.
Texto completoHarshavardhan, H., Sanjana Madi, Shivaleela Kalasad, Sameeksha Shetty, and Vaibhavi Malemath. "Ensuring Data Security in the Cloud: Emerging Security Challenges and Solutions." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894030.
Texto completoJasser, Stefanie, and Matthias Riebisch. "Reusing security solutions." In ECSAW '16: European Conference on Software Architecture Workshops. ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.
Texto completoFischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.
Texto completoFischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.
Texto completoSpitz, Stephan, and Alexander Lawall. "Silicon-Integrated Security Solutions Driving IoT Security." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012350200003648.
Texto completoHabbak, Hany, Khaled Metwally, and Ahmed Maher Mattar. "Securing Big Data: A Survey on Security Solutions." In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.
Texto completoAdibi, S. "Comparative mobile platforms security solutions." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.
Texto completoInformes sobre el tema "Security solutions"
Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada522104.
Texto completoHowell, Gema. Security Analysis of IoT Management Solutions for First Responders. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.
Texto completoBoyens, Chantel, and Jack Smalligan. Social Security Customer Service Challenges: Causes, Impacts, and Solutions. AARP Public Policy Institute, 2024. http://dx.doi.org/10.26419/ppi.00239.001.
Texto completoPudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524811.
Texto completoWard, Heather, and Sarah Brown. GNSI Decision Brief: Beyond Intervention: Sustainable Solutions for Haiti’s Security Needs. Global and National Security Institute, 2024. http://dx.doi.org/10.5038/nlry9529.
Texto completoŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.
Texto completoSchulzrinne, H., E. Marocco, and E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5765.
Texto completoTalebian, Sara, Frida Lager, and Katy Harris. Solutions for managing food security risks in a rapidly changing geopolitical landscape. Stockholm Environment Institute, 2024. http://dx.doi.org/10.51414/sei2024.044.
Texto completoPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Texto completoGopalan, Sundararajan Srinivasa, Rajesh Bhatia, Sonalini Khetrapal, and Sungsup Ra. Addressing Nutrition Security in Urban India through Multisectoral Action. Asian Development Bank, 2022. http://dx.doi.org/10.22617/wps220057-2.
Texto completo