Seite 1 von 610.910 Ergebnissen

Sortieren nach: Relevanz | Aktualität neu zuerst | Titel A-Z

Treffer filtern

Externe Quellen

Suchen...

Synonyme wurden verwendet für: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Security Warning Life Cycle: Challenges and Panacea

    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Schlagwörter: Security, Security Dialogues, Security Warning, Usable Security
  2.  

    Water and U.S. national security

    Busby, Joshua / Council on Foreign Relationspublisher | TIBKAT | 2017
    Schlagwörter: Security, International, National security, Water security
  3.  

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Schlagwörter: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics
  4.  

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Schlagwörter: Governance of security, security regulation, security sector, security managers
  5.  

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Schlagwörter: state security, human security, personal security
  6.  

    Personal Security: Current State and Development Prospects for the Reflection on Security of Individuals and Human Collectivitie

    Urbanek, Andrzej | DataCite | 2017
    Schlagwörter: personal security, structural security, human security
  7.  

    Eliciting and refining requirements for comprehensible security

    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Schlagwörter: information security, security requirements, comprehensible security
  8.  

    Conclusion

    Edgerton, Michael | Wiley | 2013
    Schlagwörter: maritime security, port security, design security, security risk
  9.  

    Security behaviors of smartphone users

    Das, Amit / Khan, Habib Ullah | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security
  10.  

    The Law and Economics of Cybersecurity: An Introduction

    Grady, M. / Parisi, F. | British Library Conference Proceedings | 2005
    Schlagwörter: Cyber security, Computer security., Computer security
  11.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Schlagwörter: Information security, Security behaviours, Email security, Security training
  12.  

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security
  13.  

    OPSEC Model and Applications

    Akman, M. Kubilay | DataCite | 2018
    Schlagwörter: security studies, sociology of security, security management, information security, cyber security
  14.  

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Schlagwörter: Security, software security, security metrics, software security metrics, security requirements engineering
  15.  

    The character and value of vernacular security: the case of South West Cameroon

    Baker, Bruce / Lekunze, Manu | Taylor & Francis Verlag | 2019
    Schlagwörter: Vernacular security, contested security, security studies, security in Cameroon
  16.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  17.  

    The Design of the Enterprise Network Security Solutions

    Nationallizenz
    Liu, Qing Li / Wang, Xiao Qing | Trans Tech Publications | 2014
    Schlagwörter: Security, Network Security, Windows Security
  18.  

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Schlagwörter: Cyber security, Security statements
  19.  

    Importance of Mobile Security

    Priyanshi Gupta / Latika Kharb | BASE | 2019
    Schlagwörter: Computer Security, Mobile security, data security
  20.  

    Masking Proofs are Tight and How to Exploit it in Security Evaluations

    Grosso, Vincent / Standaert, François-Xavier | BASE | 2018
    Schlagwörter: Security level; Security evaluation

Ergebnisse anzeigen: 10 | 20 | 50

Feedback