Gotowa bibliografia na temat „Security solution”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security solution”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security solution"
Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Pełny tekst źródłaShukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.
Pełny tekst źródłaLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Pełny tekst źródłaTyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.
Pełny tekst źródłaČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Pełny tekst źródłaBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Pełny tekst źródłaStashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.
Pełny tekst źródłaSharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.
Pełny tekst źródłaOliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.
Pełny tekst źródłaKandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.
Pełny tekst źródłaRozprawy doktorskie na temat "Security solution"
Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Pełny tekst źródłaHensley, Katrina Ludden Fredrick. "ATM security via "Stargate" solution /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA370810.
Pełny tekst źródłaHensley, Katrina, and Fredrick Ludden. "ATM security via "Stargate" solution." Thesis, Monterey, California: Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13683.
Pełny tekst źródłaSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Pełny tekst źródłaMarcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.
Pełny tekst źródłaNg, Yu Loon. "Short Message Service (SMS) security solution for mobile devices." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FNg%5FYu.pdf.
Pełny tekst źródłaSomasekaram, Premathas. "Designing a Business Intelligence Solution for Analyzing Security Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208685.
Pełny tekst źródłaWilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.
Pełny tekst źródłaRajendran, Ashok. "Security Analysis of a Software Defined Wide Area Network Solution." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190193.
Pełny tekst źródłaAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Pełny tekst źródłaKsiążki na temat "Security solution"
author, Nguyen Hung, Romero Stephanie author, Levison Jakob author, and Selga Dominici author, eds. WordPress: Brute security & Bot defense solution. National University, 2013.
Znajdź pełny tekst źródłaAstutiningtyas, Elisabeth Tri. Energy poverty: Fact & solution. IESR, 2010.
Znajdź pełny tekst źródłaInstitute for Essential Services Reform. Energy poverty: Fact and solution. Institute for Essential Services Reform, 2010.
Znajdź pełny tekst źródłaMourani, Gerhard. Securing & optimizing Linux: The ultimate solution. Open Network Architecture Inc., 2001.
Znajdź pełny tekst źródłaBeard, Sam. Restoring hope in America: The social security solution. Institute for Contemporary Studies, 1996.
Znajdź pełny tekst źródłaZhen, Jiang, and Pan Yi, eds. From problem to solution: Wireless sensor networks security. Nova Science, 2008.
Znajdź pełny tekst źródłaAmerican Bar Association. Standing Committee on Law and National Security. and American Bar Association Meeting, eds. National security leaks: Is there a legal solution?. American Bar Association, Standing Committee on Law and National Security, 1986.
Znajdź pełny tekst źródłaInternational Business Machines Corporation. International Technical Support Organization, ed. Designing for solution-based security on z/OS. IBM, International Technical Support Organization, 2008.
Znajdź pełny tekst źródłaJoe, McGraw, and Lauchengco Duane, eds. The sovereignty solution: A common sense approach to global security. Naval Institute Press, 2011.
Znajdź pełny tekst źródłaSecurity, Inter-American Conference on Social. Financing problems and options for a solution: The Americas social security report, 2002. Inter-American Conference on Social Security, 2002.
Znajdź pełny tekst źródłaCzęści książek na temat "Security solution"
Welsh, Sean. "Solution design." In Ethics and Security Automata. Routledge, 2017. http://dx.doi.org/10.4324/9781315168951-5.
Pełny tekst źródłaNeelakrishnan, Priyanka. "Data Security Solution Design." In Autonomous Data Security. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0838-8_4.
Pełny tekst źródłaZhang, Weijia, and Tej Anand. "Security Considerations." In Blockchain and Ethereum Smart Contract Solution Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8164-2_8.
Pełny tekst źródłaYang, Haomiao, Hongwei Li, and Xuemin Sherman Shen. "Complete ADS-B Security Solution." In Secure Automatic Dependent Surveillance-Broadcast Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07021-1_5.
Pełny tekst źródłaThomas, Shince, Devesh Misra, P. R. Lakshmi Eswari, and N. Sarat Chandra Babu. "A Transparent End-to-End Security Solution." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_28.
Pełny tekst źródłaHernandez Fernandez, Javier, Aymen Omri, and Roberto Di Pietro. "PLC Network Integrity Solution." In Physical Layer Security in Power Line Communications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57349-1_9.
Pełny tekst źródłaChorghe, Sharvari Prakash, and Narendra Shekokar. "A Solution to Detect Phishing in Android Devices." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_25.
Pełny tekst źródłaChoi, SuGil, Kwangjo Kim, and ByeongGon Kim. "Practical Solution for Location Privacy in Mobile IPv6." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_6.
Pełny tekst źródłaRadha, V., and N. Hemanth Kumar. "EISA – An Enterprise Application Security Solution for Databases." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_12.
Pełny tekst źródłaAbdul Based, Md. "Information Handling in Security Solution Decisions." In Innovations and Advances in Computer Sciences and Engineering. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_67.
Pełny tekst źródłaStreszczenia konferencji na temat "Security solution"
Qatinah, Shatha Hameed, and Ibrahim Ahmed Al-Baltah. "Kerberos Protocol: Security Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777133.
Pełny tekst źródłaChiș, Alexandru, Titus-Constantin Bălan, Petru-Adrian Cotfas, and Daniel-Tudor Cotfas. "Deployment of a security solution for cloud." In 2024 15th International Conference on Communications (COMM). IEEE, 2024. http://dx.doi.org/10.1109/comm62355.2024.10741412.
Pełny tekst źródłaKumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.
Pełny tekst źródłaYassine, Hicham, and Mohammad Malli. "A Lightweight IoT Security Solution." In 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2019. http://dx.doi.org/10.1109/iwcmc.2019.8766687.
Pełny tekst źródłaLiu, W., and E. K. Park. "e-Healthcare Security Solution Framework." In 2012 21st International Conference on Computer Communications and Networks - ICCCN 2012. IEEE, 2012. http://dx.doi.org/10.1109/icccn.2012.6289239.
Pełny tekst źródłaJaigirdar, Fariha Tasmin. "Trust based Security Solution for Internet of Things Healthcare Solution." In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2018. http://dx.doi.org/10.1145/3267305.3277810.
Pełny tekst źródłaXu, Yuanyuan, and He Yang. "Security Solution Based on WSO2 IS." In 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press, 2015. http://dx.doi.org/10.2991/ameii-15.2015.35.
Pełny tekst źródłaWerapun, W., A. Abou El Kalam, B. Paillassa, and J. Fasson. "Solution analysis for SIP security threats." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256707.
Pełny tekst źródłaWu, Kai-xing, and Han Xi. "Research on AJAX Security and Solution." In Proceedings of the International Conference. World Scientific Publishing Company, 2008. http://dx.doi.org/10.1142/9789812799524_0320.
Pełny tekst źródłaNewaz, Nishat Tasnim, Mohammad Rafiqul Haque, Tajim Md Niamat Ullah Akhund, Tania Khatun, Milon Biswas, and Mohammad Abu Yousuf. "IoT Security Perspectives and Probable Solution." In 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). IEEE, 2021. http://dx.doi.org/10.1109/worlds451998.2021.9513997.
Pełny tekst źródłaRaporty organizacyjne na temat "Security solution"
Mattila, Petri. Finland's Security Solution in the Future. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589427.
Pełny tekst źródłaShah, Viren. An Aspect-Oriented Security Assurance Solution. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada419305.
Pełny tekst źródłaPruet, Andres. The National Security Data Solution (NSDS). Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1878003.
Pełny tekst źródłaMylrea, Michael, Sri Nikhil Gourisetti, Judah Plummer, et al. Keyless Infrastructure Security Solution (Kiss): Examining Security and Trust Gaps. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1827741.
Pełny tekst źródłaMylrea, Michael, Sri Nikhil Gourisetti, and Heather Culley. Keyless Infrastructure Security Solution (KISS) Technology Landscape Analysis Report. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1826603.
Pełny tekst źródłaChiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.
Pełny tekst źródłaChiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.
Pełny tekst źródłaPerkins, C., and M. Westerlund. Securing the RTP Framework: Why RTP Does Not Mandate a Single Media Security Solution. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7202.
Pełny tekst źródłaMylrea, Michael, Sri Nikhil Gourisetti, Vinod Tatireddy, et al. Keyless Infrastructure Security Solution (KISS): VOLTRON KSI Blockchain Design and Specification. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1828066.
Pełny tekst źródłaŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.
Pełny tekst źródła