Добірка наукової літератури з теми "Secur"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secur".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secur"
Zivanovic, Irena, Jacek Kociszewski, Jakob Eberhard, and Volker Viereck. "Bladder perforation after TVT-Secur™ procedure: how secure is TVT-Secur™?" Archives of Gynecology and Obstetrics 289, no. 1 (2013): 131–34. http://dx.doi.org/10.1007/s00404-013-2968-8.
Повний текст джерелаIncavo, Stephen J., Bruce D. Beynnon, and Kathryn M. Coughlin. "Total Hip Arthroplasty with the Secur-Fit and Secur-Fit Plus Femoral Stem Design." Journal of Arthroplasty 23, no. 5 (2008): 670–76. http://dx.doi.org/10.1016/j.arth.2007.05.044.
Повний текст джерелаHota, Lekha S., Katherine Hanaway, Michele R. Hacker, et al. "TVT-Secur (Hammock) Versus TVT-Obturator." Female Pelvic Medicine & Reconstructive Surgery 18, no. 1 (2012): 39–43. http://dx.doi.org/10.1097/spv.0b013e31823bdbcf.
Повний текст джерелаMolden, Stephanie M., and Vincent R. Lucente. "New minimally invasive slings: TVT Secur." Current Urology Reports 9, no. 5 (2008): 358–61. http://dx.doi.org/10.1007/s11934-008-0062-8.
Повний текст джерелаUddain, Jasim. "Enhancing food safety and security through organic agriculture and innovative fertilizer management." Asian-Australasian Journal of Food Safety and Security 8, no. 2 (2024): 27–31. http://dx.doi.org/10.3329/aajfss.v8i2.74060.
Повний текст джерелаKabir, SM Lutful. "Nourishing minds and bodies: the imperative of food safety and security." Asian-Australasian Journal of Food Safety and Security 8, no. 1 (2024): 1–4. http://dx.doi.org/10.3329/aajfss.v8i1.71842.
Повний текст джерелаNeogi, Sucharit Basu. "Addressing the climate-food-health nexus: strengthening ecosystem-based adaptation and One Health." Asian-Australasian Journal of Food Safety and Security 9, no. 1 (2025): 1–4. https://doi.org/10.3329/aajfss.v9i1.79031.
Повний текст джерелаRichard, Patrick, Louis-Olivier Gagnon, and Le Mai Tu. "“U-Method” TVT-Secur Slings: Are they obstructive?" Canadian Urological Association Journal 6, no. 2 (2012): 104–7. http://dx.doi.org/10.5489/cuaj.11124.
Повний текст джерелаHale, John, and Paul Brusil. "Secur(e/ity) Management: A Continuing Uphill Climb." Journal of Network and Systems Management 15, no. 4 (2007): 525–53. http://dx.doi.org/10.1007/s10922-007-9079-4.
Повний текст джерелаKhandwala, Salil, and Chaandini Jayachandran. "TVT-Secur in Office Sling Procedure Under Local Anesthesia." Female Pelvic Medicine & Reconstructive Surgery 18, no. 4 (2012): 233–38. http://dx.doi.org/10.1097/spv.0b013e318259f6b2.
Повний текст джерелаДисертації з теми "Secur"
Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.
Повний текст джерелаNeubert, Janek. "Secure WebServer." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.
Повний текст джерелаBelostotsky, Eugene B. (Eugene Boris). "Secure SNMP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42758.
Повний текст джерелаMahar, Anthony J. "Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/34434.
Повний текст джерелаTanik, Guven Orkun. "Secure Mail Gateway." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612038/index.pdf.
Повний текст джерелаMuhovic, Admir. "Secure Wireless Communication." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92023.
Повний текст джерелаSt-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Повний текст джерелаGuler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.
Повний текст джерелаVolaco, Gustavo Capobiano. "Viver ou secar?" reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/23548.
Повний текст джерелаHu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.
Повний текст джерелаКниги з теми "Secur"
Laird, Robbin F. Britain's security policy: The Modern Soviet view. Alliance for the Institute for European Defence & Strategic Studies, 1988.
Знайти повний текст джерелаDonnelly, C. N. Nations, alliances and security: A collection of writings. Akadémiai Kiadó, 2004.
Знайти повний текст джерелаMima, Cataldo, ed. The Women's encampment for a future of peace and justice: Images and writings. Temple University Press, 1987.
Знайти повний текст джерелаBaumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.
Повний текст джерелаHegarty, Cain. Suffolk's defended shore: Coastal fortifications from the air. English Heritage, 2007.
Знайти повний текст джерелаLeader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.
Знайти повний текст джерелаЧастини книг з теми "Secur"
Sakamuri, Lokesh, Sai Chandana Thiruvuru, Rohit Gupta Kunala, et al. "Optimum Transportation Scheme for Healthcare Supply Chain Management." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-8.
Повний текст джерелаHammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. "Introduction." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-1.
Повний текст джерелаAli, Gauhar, Mohammed El-Affendi, and Ahmed A. Abd El-Latif. "Securing Digital Health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-4.
Повний текст джерелаSahid, Abdelkebir. "Securing Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-9.
Повний текст джерелаYassine, Maleh, and Taqafi Issam. "Securing the Future of E-health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-3.
Повний текст джерелаJafar, Uzma, and Hafiz Adnan Hussain. "Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-7.
Повний текст джерелаZainuddin, Ahmad Anwar, Muhammad Hazrin Fahmi bin Abd Halim, Nur Syafika Bahrudin, Aida Shahiedun, Nik Muhammd Faris Firdaus bin Norazman, and Muhammad Falikh Fikri bin Mohd Fauzi. "IoT Application, Privacy, and Security in Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-2.
Повний текст джерелаHammad, Mohamed. "Biometric Security and Access Management in E-health Services." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-5.
Повний текст джерелаDo, Phuc Hao, Thanh Liem Tran, Van Dai Pham, Abdelhamied A. Ateya, and Tran Duc Le. "Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-6.
Повний текст джерелаHughes, Vera, and David Weller. "Secure." In People in Retailing. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-09897-2_18.
Повний текст джерелаТези доповідей конференцій з теми "Secur"
Sulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.
Повний текст джерелаNath, Sumon, Agustin Navarro-Torres, Alberto Ros, and Biswabandan Panda. "Secure Prefetching for Secure Cache Systems." In 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2024. https://doi.org/10.1109/micro61859.2024.00017.
Повний текст джерелаRezaei, Tahereh, Chitra Vadlamani, Amir Kalev, and Jonathan L. Habif. "Quantum Pulse Position Modulation using Entangled States for Communication Security." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jw2a.86.
Повний текст джерелаMeng, Xuanqi, Jiarun Zhou, Xiulong Liu, Xinyu Tong, Wenyu Qu, and Jianrong Wang. "Secur-Fi: A Secure Wireless Sensing System Based on Commercial Wi-Fi Devices." In IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. IEEE, 2023. http://dx.doi.org/10.1109/infocom53939.2023.10229055.
Повний текст джерелаOvilla-Martinez, Brisbane, and Lilian Bossuet. "Restoration protocol: Lightweight and secur devices authentication based on PUF." In 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC). IEEE, 2017. http://dx.doi.org/10.1109/vlsi-soc.2017.8203460.
Повний текст джерелаSteger, Marco, Carlo Boano, Michael Karner, Joachim Hillebrand, Werner Rom, and Kay Romer. "SecUp: Secure and Efficient Wireless Software Updates for Vehicles." In 2016 Euromicro Conference on Digital System Design (DSD). IEEE, 2016. http://dx.doi.org/10.1109/dsd.2016.11.
Повний текст джерелаWang, Chao, Wen Yu Kon, Hong Jie Ng, and Charles C. W. Lim. "Experimental symmetric private information retrieval with measurement-device-independent quantum network." In CLEO: Fundamental Science. Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.ff1a.3.
Повний текст джерелаKumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.
Повний текст джерелаFelcan, Miroslav. "Historical Cross-Section of Arson." In Safe and Secure Society. The College of European and Regional Studies, 2020. http://dx.doi.org/10.36682/ssc_2020/1.
Повний текст джерелаYun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.
Повний текст джерелаЗвіти організацій з теми "Secur"
Nelson, Cynthia Lee. Secure portal. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/921125.
Повний текст джерелаDunigan, T. H., and N. Venugopal. Secure PVM. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/406053.
Повний текст джерелаKrishnan, S., J. Laganier, M. Bonola, and A. Garcia-Martinez. Secure Proxy ND Support for SEcure Neighbor Discovery (SEND). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6496.
Повний текст джерелаArcher, M., D. A. Frincke, and K. Levitt. Secure resource management: Specifying and testing secure operating systems. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/6023693.
Повний текст джерелаShands, Deborah. Secure Virtual Enclaves. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402350.
Повний текст джерелаLuu, Brian B. Secure Link Middleware. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada485508.
Повний текст джерелаDougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada501670.
Повний текст джерелаAderholdt, Ferrol, Blake A. Caldwell, Susan Elaine Hicks, et al. Secure Storage Architectures. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1195819.
Повний текст джерелаDougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada636498.
Повний текст джерелаGibbs, P. W. Secure Transportation Management. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1160060.
Повний текст джерела