Seite 1 von 610.910 Ergebnissen

Sortieren nach: Relevanz | Aktualität neu zuerst | Titel A-Z

Treffer filtern

Externe Quellen


Synonyme wurden verwendet für: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security

    Security Warning Life Cycle: Challenges and Panacea

    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Schlagwörter: Security, Security Dialogues, Security Warning, Usable Security

    Water and U.S. national security

    Busby, Joshua / Council on Foreign Relationspublisher | TIBKAT | 2017
    Schlagwörter: Security, International, National security, Water security

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Schlagwörter: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Schlagwörter: Governance of security, security regulation, security sector, security managers

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Schlagwörter: state security, human security, personal security

    Personal Security: Current State and Development Prospects for the Reflection on Security of Individuals and Human Collectivitie

    Urbanek, Andrzej | DataCite | 2017
    Schlagwörter: personal security, structural security, human security

    Eliciting and refining requirements for comprehensible security

    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Schlagwörter: information security, security requirements, comprehensible security


    Edgerton, Michael | Wiley | 2013
    Schlagwörter: maritime security, port security, design security, security risk

    Security behaviors of smartphone users

    Das, Amit / Khan, Habib Ullah | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security

    The Law and Economics of Cybersecurity: An Introduction

    Grady, M. / Parisi, F. | British Library Conference Proceedings | 2005
    Schlagwörter: Cyber security, Computer security., Computer security

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Schlagwörter: Information security, Security behaviours, Email security, Security training

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security

    OPSEC Model and Applications

    Akman, M. Kubilay | DataCite | 2018
    Schlagwörter: security studies, sociology of security, security management, information security, cyber security

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Schlagwörter: Security, software security, security metrics, software security metrics, security requirements engineering

    The character and value of vernacular security: the case of South West Cameroon

    Baker, Bruce / Lekunze, Manu | Taylor & Francis Verlag | 2019
    Schlagwörter: Vernacular security, contested security, security studies, security in Cameroon

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center

    The Design of the Enterprise Network Security Solutions

    Liu, Qing Li / Wang, Xiao Qing | Trans Tech Publications | 2014
    Schlagwörter: Security, Network Security, Windows Security

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Schlagwörter: Cyber security, Security statements

    Importance of Mobile Security

    Priyanshi Gupta / Latika Kharb | BASE | 2019
    Schlagwörter: Computer Security, Mobile security, data security

    Masking Proofs are Tight and How to Exploit it in Security Evaluations

    Grosso, Vincent / Standaert, François-Xavier | BASE | 2018
    Schlagwörter: Security level; Security evaluation

Ergebnisse anzeigen: 10 | 20 | 50