Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
You've got mail - and a whole bunch of issues
IET Digital Library Archive | 2006|Keywords: data security, security of data -
Year 2000 computing problem: implications for business and society
IET Digital Library Archive | 1998|Keywords: data integrity -
Year 2000 and all that: securing business continuity
IET Digital Library Archive | 1999|Keywords: data integrity -
Who can you trust? [trusted computing]
IET Digital Library Archive | 2004|Keywords: data integrity -
Web-based command and control: the millenium experience
IET Digital Library Archive | 2001|Keywords: data integrity -
Wavelet transform-based analogue speech scrambling scheme
IET Digital Library Archive | 1996|Keywords: security of data -
VPN applications on the Eutelsat D-Star network
IET Digital Library Archive | 2003|Keywords: data security -
Vista vision [Microsoft Windows Vista]
IET Digital Library Archive | 2007|Keywords: security of data -
V-fairness (t, n) secret sharing scheme
IET Digital Library Archive | 1997|Keywords: security of data -
Versatile DSP-based chaotic communication system
IET Digital Library Archive | 2001|Keywords: security of data -
Verification for host confidentiality by abstract interpretation in mobile code systems
IET Digital Library Archive | 2005|Keywords: security of data -
Validating metrics for data warehouses
IET Digital Library Archive | 2002|Keywords: data integrity -
Using XML to implement attribute-based delegation
IET Digital Library Archive | 2006|Keywords: security of data -
Using trusted computing to build a safer world
IET Digital Library Archive | 2006|Keywords: security of data -
Using threats to demonstrate the elements of information security
IET Digital Library Archive | 1995|Keywords: data integrity, security of data -
Using the remote socket architecture as NAT replacement
IET Digital Library Archive | 2003|Keywords: security of data -
Using eCots portal for sharing information about COTS software products and producers on the Internet and in corporate intranets
IET Digital Library Archive | 2004|Keywords: data integrity -
USB based secure implementation of web system in master station
IET Digital Library Archive | 2006|Keywords: security of data -
Unified development environments for ATCA device software
IET Digital Library Archive | 2005|Keywords: security of data -
Understanding the protection game [computer network security]
IET Digital Library Archive | 2004|Keywords: security of data -
Turbo code protection of video watermark channel
IET Digital Library Archive | 2001|Keywords: security of data -
'Trusted' computing - technologies, opportunities and problems
IET Digital Library Archive | 2006|Keywords: security of data -
Trusted computing: integrating trust and security into computer platforms
IET Digital Library Archive | 2006|Keywords: security of data -
Trust and vulnerability in open source software
IET Digital Library Archive | 2002|Keywords: security of data -
Transmission code for high-speed fibre-optic data networks
IET Digital Library Archive | 1983|Keywords: data integrity -
Tracking based face identification: a way to manage occlusions, and illumination, posture and expression changes
IET Digital Library Archive | 2006|Keywords: security of data -
Towards multi-agent based security in dynamic e-service market
IET Digital Library Archive | 2006|Keywords: data security, security of data -
Towards a trust based approach to security and user confidence in pervasive computing systems
IET Digital Library Archive | 2005|Keywords: data security -
Towards a secure videoconferencing system for mobile users
IET Digital Library Archive | 2003|Keywords: security of data -
Towards an integrated method for hybrid information system development
IET Digital Library Archive | 1997|Keywords: data integrity -
(t, n) threshold verifiable multisecret sharing scheme based on the factorisation intractability and discrete logarithm modulo a composite problems
IET Digital Library Archive | 1999|Keywords: security of data -
Threats to next generation mobile application software
IET Digital Library Archive | 2004|Keywords: security of data -
Threats and protection: attack and defend
IET Digital Library Archive | 2004|Keywords: security of data -
The technology works - the law doesn't: legal aspects of secure electron commerce
IET Digital Library Archive | 1998|Keywords: data integrity -
The storage burden [IT security policies]
IET Digital Library Archive | 2006|Keywords: security of data -
The requirements of the Data Protection Act 1998
IET Digital Library Archive | 2006|Keywords: security of data -
The law and its impact on the way data security issues are addressed
IET Digital Library Archive | 1996|Keywords: data security issues, security of data -
The importance of employee awareness to information security
IET Digital Library Archive | 2006|Keywords: security of data -
The implications of tolerancing for computer-aided mechanical design
IET Digital Library Archive | 1988|Keywords: data integrity -
The four phases of security
IET Digital Library Archive | 2005|Keywords: data integrity, security of data -
The emergence of ZigBee in building automation and industrial controls
IET Digital Library Archive | 2005|Keywords: security of data
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.