Literatura científica selecionada sobre o tema "Security solutions"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Security solutions".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Security solutions"
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Texto completo da fonteXu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Texto completo da fonteWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Texto completo da fonteGOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Texto completo da fonteNanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (August 5, 2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.
Texto completo da fonteLi, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (August 1, 2024): 42–47. https://doi.org/10.5281/zenodo.12789566.
Texto completo da fonteAnupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (June 1, 2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.
Texto completo da fonteKenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (February 1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.
Texto completo da fonteRanjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (January 20, 2022): 616–20. https://doi.org/10.5281/zenodo.6345325.
Texto completo da fonteGolchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (April 27, 2015): 21–24. https://doi.org/10.70729/ijser1567.
Texto completo da fonteTeses / dissertações sobre o assunto "Security solutions"
Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.
Texto completo da fonteMustafa, Ali, Nasir Siddique, and Mubeen Zubair. "DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.
Texto completo da fonteAlsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.
Texto completo da fonteBailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Texto completo da fonteHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Texto completo da fonteAlexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Texto completo da fonteSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Texto completo da fonteRaza, Shahid. "Lightweight Security Solutions for the Internet of Things." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.
Texto completo da fonteHussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Texto completo da fonteLejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.
Texto completo da fonteLivros sobre o assunto "Security solutions"
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Encontre o texto completo da fonteM, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Encontre o texto completo da fonteHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Encontre o texto completo da fonteMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Encontre o texto completo da fonteInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Encontre o texto completo da fonteAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.
Encontre o texto completo da fonteSarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Texto completo da fonteMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Security solutions"
Versluis, Gerald, and Steven Thewissen. "Network and Security." In Xamarin.Forms Solutions, 153–89. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.
Texto completo da fonteSchreck, Jörg. "Solutions for Security." In Security and Privacy in User Modeling, 95–156. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.
Texto completo da fonteStevens, Alex. "Implementing Security Solutions." In Enterprise Fortress, 76–84. Boca Raton: CRC Press, 2025. https://doi.org/10.1201/9781003585923-7.
Texto completo da fonteWiddowson, Amanda. "Mitigating solutions." In Humans and Cyber Security, 74–107. Boca Raton: CRC Press, 2025. https://doi.org/10.1201/9781003427681-6.
Texto completo da fonteLi, Bin, and David Zhang. "Signature Security System for E-Commerce." In Biometric Solutions, 187–216. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.
Texto completo da fonteMorton, Adam. "Managing Security and Access Control." In Mastering Snowflake Solutions, 67–98. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.
Texto completo da fonteKhairallah, Michael. "Presenting the Solutions." In Physical Security Assessment Handbook, 188–201. 2nd ed. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.4324/9781003490432-8.
Texto completo da fonteMcDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman, and David C. Knox. "Security Packages." In Mastering Oracle PL/SQL: Practical Solutions, 415–62. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.
Texto completo da fonteLing, Lee Luan, and Miguel Gustavo Lizárraga. "Biometrics on the Internet: Security Applications and Services." In Biometric Solutions, 131–67. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.
Texto completo da fonteYou, Jane, and David Zhang. "Web Guard: A Biometrics Identification System for Network Security." In Biometric Solutions, 217–41. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Security solutions"
Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA), 605–10. IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.
Texto completo da fonteHarshavardhan, H., Sanjana Madi, Shivaleela Kalasad, Sameeksha Shetty, and Vaibhavi Malemath. "Ensuring Data Security in the Cloud: Emerging Security Challenges and Solutions." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), 73–78. IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894030.
Texto completo da fonteJasser, Stefanie, and Matthias Riebisch. "Reusing security solutions." In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.
Texto completo da fonteFischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.
Texto completo da fonteFischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.
Texto completo da fonteSpitz, Stephan, and Alexander Lawall. "Silicon-Integrated Security Solutions Driving IoT Security." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012350200003648.
Texto completo da fonteHabbak, Hany, Khaled Metwally, and Ahmed Maher Mattar. "Securing Big Data: A Survey on Security Solutions." In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.
Texto completo da fonteAdibi, S. "Comparative mobile platforms security solutions." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.
Texto completo da fonteMondol, Joel-Ahmed M. "Cloud security solutions using FPGA." In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032987.
Texto completo da fonteSuomalainen, Jani, and Pasi Hyttinen. "Security Solutions for Smart Spaces." In 2011 IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT). IEEE, 2011. http://dx.doi.org/10.1109/saint.2011.57.
Texto completo da fonteRelatórios de organizações sobre o assunto "Security solutions"
Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada522104.
Texto completo da fonteHowell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.
Texto completo da fonteBoyens, Chantel, and Jack Smalligan. Social Security Customer Service Challenges: Causes, Impacts, and Solutions. Washington, DC: AARP Public Policy Institute, July 2024. http://dx.doi.org/10.26419/ppi.00239.001.
Texto completo da fontePudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1524811.
Texto completo da fonteWard, Heather, and Sarah Brown. GNSI Decision Brief: Beyond Intervention: Sustainable Solutions for Haiti’s Security Needs. Tampa, FL: Global and National Security Institute, June 2024. http://dx.doi.org/10.5038/nlry9529.
Texto completo da fonteŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, December 2024. https://doi.org/10.57005/ab.2024.3.4.
Texto completo da fonteSchulzrinne, H., E. Marocco, and E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, February 2010. http://dx.doi.org/10.17487/rfc5765.
Texto completo da fonteTalebian, Sara, Frida Lager, and Katy Harris. Solutions for managing food security risks in a rapidly changing geopolitical landscape. Stockholm Environment Institute, November 2024. http://dx.doi.org/10.51414/sei2024.044.
Texto completo da fontePasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, March 2025. https://doi.org/10.62311/nesx/rrv225.
Texto completo da fonteResearch Team, Karamoja–Turkana Community. Community Solutions to Insecurity Along the Uganda–Kenya Border. Institute of Development Studies, December 2023. http://dx.doi.org/10.19088/ids.2023.057.
Texto completo da fonte