Gotowa bibliografia na temat „Security measures”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security measures”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security measures"
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Pełny tekst źródłaRamolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.
Pełny tekst źródłaMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Pełny tekst źródłaDr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Pełny tekst źródłaD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Pełny tekst źródłaGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Pełny tekst źródłaRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.
Pełny tekst źródłaRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.
Pełny tekst źródłaStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Pełny tekst źródłaWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Pełny tekst źródłaRozprawy doktorskie na temat "Security measures"
Paul, Philip Christopher. "Microelectronic security measures." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Pełny tekst źródłaKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Pełny tekst źródłaSantos, Alvaro K. "Economic aspects of airport security measures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Pełny tekst źródłaKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES." UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Pełny tekst źródłaMohsen, Rabih. "Quantitative measures for code obfuscation security." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Pełny tekst źródłaCachin, Christian. "Entropy measures and unconditional security in cryptography /." [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Pełny tekst źródłaRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Pełny tekst źródłaAcharya, Gautam. "Legal aspects of aviation security measures taken at airports." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Pełny tekst źródłaCioranu, Adrian Gabriel. "Facilitation versus security." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Pełny tekst źródłaNaude, Kevin Alexander. "Assessing program code through static structural similarity." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Pełny tekst źródłaKsiążki na temat "Security measures"
Hakim, Simon. Commercial security: Burglary patterns and security measures. Security Industry Association, 1994.
Znajdź pełny tekst źródłaParsons, Brinckerhoff Quade &. Douglas. Transportation security. Transportation Research Board, 2006.
Znajdź pełny tekst źródłaCorporation, Science Applications International. Security Measures for Ferry Systems. Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Pełny tekst źródłaUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., et al., eds. Transportation security. Transportation Research Board, 2006.
Znajdź pełny tekst źródłaFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Transportation Research Board, 2009.
Znajdź pełny tekst źródłaCzęści książek na temat "Security measures"
Combs, Cynthia C. "Security Measures." In Terrorism in the Twenty-First Century, 9th ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Pełny tekst źródłaJohnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.
Pełny tekst źródłaThompson, Eric C. "Selecting Security Measures." In Building a HIPAA-Compliant Cybersecurity Program. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Pełny tekst źródłaArmstrong, Thomas E. "Risk and security." In Members, Methods, and Measures. CRC Press, 2025. https://doi.org/10.1201/9781003562160-14.
Pełny tekst źródłaDas, Satya P. "Security." In Economics of Terrorism and Counter-Terrorism Measures. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Pełny tekst źródłaBrauner, Florian. "Acceptance of Security Measures." In Securing Public Transportation Systems. Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Pełny tekst źródłaMcLean, John. "Quantitative Measures of Security." In Dependable Computing and Fault-Tolerant Systems. Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Pełny tekst źródłaMartin, Paul. "In-trust measures." In Insider Risk and Personnel Security. Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Pełny tekst źródłaMartin, Paul. "Pre-trust measures." In Insider Risk and Personnel Security. Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Pełny tekst źródłaSmoke, Richard. "Crisis Control Measures." In Nuclear Strategy and World Security. Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Pełny tekst źródłaStreszczenia konferencji na temat "Security measures"
R.Tamilkodi, Mrs.A.Harika, Mogalapalli Harika, P. Venkata Sai Abhilash, Chenagana Harish Sai, and Pranav Ps. "Enhanced Security Measures Against Phishing Threats." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810772.
Pełny tekst źródłaQin, Qiu, Xu Sijia, Liu Shenglan, Xu Tianni, and Zhao Bei. "Network Virtualization Security: Threats, Measures, and Use Cases." In 2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K). IEEE, 2024. https://doi.org/10.23919/ituk62727.2024.10772977.
Pełny tekst źródłaKrishna, Dondapati Manoj, Medasani Veda Pranay, and Shaik Khaja Mohiddin. "Security Measures in Cloud-Driven Home Automation Systems." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00032.
Pełny tekst źródłaJyothi, V. Esther, G. Rakesh, Vipparla Aruna, Shobana Gorintla, Yalanati Ayyappa, and U. Ganesh Naidu. "Enhanced Monitoring and Security Measures with Video Analysis." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894596.
Pełny tekst źródłaZheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Pełny tekst źródła"Microarchitectures undo software security measures." In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Pełny tekst źródłaBramson, Aaron L. "Methodology for building confidence measures." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Pełny tekst źródłaGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Pełny tekst źródłaGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Pełny tekst źródłaLiu, Shuiyin, Yi Hong, and Emanuele Viterbo. "On measures of information theoretic security." In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Pełny tekst źródłaRaporty organizacyjne na temat "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Pełny tekst źródłaSantos, Ramon G. Confidence-Building Measures in Philippine Security. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada345450.
Pełny tekst źródłaNathanson, David. Security and Stability Operations Measures of Effectiveness. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada464303.
Pełny tekst źródłaHiraki, Ayaka. Japan’s economic security measures are immense but ineffective. East Asia Forum, 2024. https://doi.org/10.59425/eabc.1733522400.
Pełny tekst źródłaKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Pełny tekst źródłaMinchev, Zlatogor, and Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Pełny tekst źródłaMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly, and Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada245754.
Pełny tekst źródłaMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Iowa State University, 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Pełny tekst źródłaMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson, and Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada280487.
Pełny tekst źródłaCapper, Tim, and Alan Walker. Energy security. Parliamentary Office of Science and Technology, 2022. http://dx.doi.org/10.58248/pn676.
Pełny tekst źródła