Erscheinungsjahr
Medientyp
Datenquelle
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Datensicherheit
Suche ohne Synonyme: keywords:(Datensicherheit)
Verwendete Synonyme:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
A canonical analysis of intentional information security breaches by insiders
Emerald Group Publishing | 2009|Schlagwörter: Data security -
Access control and privacy in web-based social networks
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Achieving automated intrusion response: a prototype implementation
Emerald Group Publishing | 2006|Schlagwörter: Data security -
A computer emergency response team policy
Emerald Group Publishing | 1996|Schlagwörter: Data integrity -
A conceptual foundation for organizational information security awareness
Emerald Group Publishing | 2000|Schlagwörter: Data security -
A cross-cultural investigation of situational information security awareness programs
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Addressing dynamic issues in information security management
Emerald Group Publishing | 2011|Schlagwörter: Data security -
A descriptive model of online shopping process: some empirical results
Emerald Group Publishing | 2003|Schlagwörter: Data security -
Adopting social media as an information system – a case study of an internet service company in Abuja, Nigeria
Emerald Group Publishing | 2020|Schlagwörter: Data security -
A framework for improving quality in misuse case models
Emerald Group Publishing | 2012|Schlagwörter: Data security -
A framework for outsourcing IS/IT security services
Emerald Group Publishing | 2006|Schlagwörter: Data security -
After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations
Emerald Group Publishing | 2021|Schlagwörter: Data security -
A generic Grid security policy reconciliation framework
Emerald Group Publishing | 2005|Schlagwörter: Data security -
A generic service model for secure data interchange
Emerald Group Publishing | 2005|Schlagwörter: Data security -
A good-practice guidance on the use of PKI services in the public sector of the European Union member states
Emerald Group Publishing | 2005|Schlagwörter: Data security -
A longitudinal analysis of data breaches
Emerald Group Publishing | 2011|Schlagwörter: Data security -
A metadata-based access control model for web services
Emerald Group Publishing | 2005|Schlagwörter: Data security -
A Model for Information Security Management
Emerald Group Publishing | 1993|Schlagwörter: Data security -
A multidimensional approach to multilevel security
Emerald Group Publishing | 2008|Schlagwörter: Data security -
An advanced web attack detection and prevention tool
Emerald Group Publishing | 2011|Schlagwörter: Data security -
An agent-based privacy-enhancing model
Emerald Group Publishing | 2008|Schlagwörter: Data security -
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes
Emerald Group Publishing | 2007|Schlagwörter: Data security -
Analyzing trajectories of information security awareness
Emerald Group Publishing | 2012|Schlagwörter: Data security -
An analysis of advance fee fraud on the internet
Emerald Group Publishing | 2008|Schlagwörter: Data security -
An analysis view on password patterns of Chinese internet users
Emerald Group Publishing | 2013|Schlagwörter: Data security -
An automated framework for managing security vulnerabilities
Emerald Group Publishing | 2005|Schlagwörter: Data security -
An efficient collusion resistant security mechanism for heterogeneous sensor networks
Emerald Group Publishing | 2009|Schlagwörter: Data security -
An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions
Emerald Group Publishing | 2005|Schlagwörter: Data security -
An empirical study of information security policy on information security elevation in Taiwan
Emerald Group Publishing | 2006|Schlagwörter: Data security -
An empirical study of the effect of perceived risk upon intention to use online applications
Emerald Group Publishing | 2005|Schlagwörter: Data security -
A neural network approach to digital data hiding based on the perceptual masking model of the human vision system
Emerald Group Publishing | 2010|Schlagwörter: Data security -
An evaluation of a secure and trustworthy mobile agent-based e-marketplace system
Emerald Group Publishing | 2012|Schlagwörter: Data security -
A new English auction scheme using the bulletin board system
Emerald Group Publishing | 2009|Schlagwörter: Data security -
A new taxonomy for comparing intrusion detection systems
Emerald Group Publishing | 2007|Schlagwörter: Data security -
A new two-tiered strategy to intrusion detection
Emerald Group Publishing | 2004|Schlagwörter: Data security -
An exploration of wireless computing risks
Development of a risk taxonomyEmerald Group Publishing | 2004|Schlagwörter: Data security -
An improved two-tiered strategy to intrusion detection
Emerald Group Publishing | 2005|Schlagwörter: Data security -
An information privacy taxonomy for collaborative environments
Emerald Group Publishing | 2006|Schlagwörter: Data security -
An innovative information hiding technique utilizing cumulative peak histogram regions
Emerald Group Publishing | 2012|Schlagwörter: Data security -
An integrated framework for eChain bank accounting systems
Emerald Group Publishing | 2005|Schlagwörter: Data security -
An integrated identity verification system for mobile terminals
Emerald Group Publishing | 2005|Schlagwörter: Data security -
An integrated view of human, organizational, and technological challenges of IT security management
Emerald Group Publishing | 2009|Schlagwörter: Data security -
A note on the using of accounting databases
Emerald Group Publishing | 2003|Schlagwörter: Data integrity -
A novel approach for regenerating a private key using password, fingerprint and smart card
Emerald Group Publishing | 2005|Schlagwörter: Data security -
A partial equilibrium view on security and privacy
Emerald Group Publishing | 2008|Schlagwörter: Data security -
A practical application of CMM to medical security capability
Emerald Group Publishing | 2008|Schlagwörter: Data security -
A PRoactive malware identification system based on the computer hygiene principles
Emerald Group Publishing | 2007|Schlagwörter: Data security -
A review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems
Emerald Group Publishing | 2010|Schlagwörter: Data security -
A review of social media security risks and mitigation techniques
Emerald Group Publishing | 2012|Schlagwörter: Data security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.