Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
5th International Conference on Critical Infrastructure (CRIS), 2010 : 20 - 22 Sept. 2010, Beijing, China ; proceedings
TIBKAT | 2010|Keywords: Computer security -
5th International Malaysian Studies Conference (MSC 5): Serdang, Malaysia, 8.-10. August 2006
Online Contents | 2006|Keywords: Internationale Sicherheit -
5th International Seminar on Vernacular Settlements, Colombo, Sri Lanka, 30.-31. Juli 2010
Online Contents | 2012|Keywords: Internationale Sicherheit -
5. Vsesoyuznaya nauchnaya konferentsiya po zashchite ot ioniziruyushchikh izluchenij yaderno-tekhnicheskikh ustanovok. (5th All-Union scientific conference on ionizing radiation protection of nuclear-technical installations)
NTIS | 1990|Keywords: Radiation Shielding, Protection, & Safety -
6.033 Computer System Engineering (SMA 5501), Spring 2005.
Computer System Engineering (SMA 5501)Free accessDSpace@MIT | 2005|Keywords: security -
6.824 Distributed Computer Systems, Fall 2002.
Distributed Computer SystemsFree accessDSpace@MIT | 2002|Keywords: security -
6.857 Network and Computer Security, Fall 2003.
Network and Computer SecurityFree accessDSpace@MIT | 2003|Keywords: electronic mail security, security, email security, computer security, network security, physical security -
6. DGA-Nachwuchstagung, Thüringer Sozialakademie Jena, 18.-20. Januar 2013
Online Contents | 2013|Keywords: Internationale Sicherheit -
6th Asia-Europe Young Leaders Symposium: Berlin, 23.-28. Juni 2002
Online Contents | 2003|Keywords: Internationale Sicherheit -
6 The Social Costs of Resilience: An Example from the Faroe Islands
Wiley | 2016|Keywords: human security -
7th DOD/NBS Computer Security Conference, September 24-26, 1984
TIBKAT | 1984|Keywords: Security measures, Computer security -
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors
British Library Conference Proceedings | 2013|Keywords: Computer security -
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors
Springer Verlag | 2013|Keywords: Systems and Data Security -
9-11 and After - Afghanistan, Graveyard of Empires - The first engagement in the new war on terrorism -- With Osama bin Ladin in Afghanistan -- Poses severe challenges for the United States. Rooting out bin Ladin's network will require military success in a country that the Soviet Union could not conquer in ten years of trying, as well as support from unstable surrounding nations. Washington may be tempted to try to oust the Taliban regime, but doing so could rekindle Afghanistan's brutal civil war. The United States must proceed with caution -- Or end up on the ash heap of Afghan history.
Online Contents | 2001|Keywords: Internationale Sicherheit -
9-11 And after - America's Real Russian Allies - September's attacks initiated a new era of world politics. As Washington scrambles to build its antiterror coalition, it may be tempted to overlook the antidemocratic excesses of its partners. But this would be a mistake, especially when it comes to Russia. Fortunately, recent poll data reveal an unlikely American ally: The Russian masses, who have grown fiercely democratic and will resist any slide toward autocracy. For more on these and related subjects, visit our Web site at www.foreignaffairs.org.
Online Contents | 2001|Keywords: Internationale Sicherheit -
9-11 And after - Preparing for the Next Attack - As Washington was fretting about ballistic missiles, 19 hijackers used commercial airliners to kill more Americans than had died in any previous attack in the country's history. And there could be worse to come. The United States is the target of a few hostile nations and well-organized terrorist groups, some of them state-sponsored. They understand that nuclear or biological weapons could do the job even better. To meet these new threats, Washington must pursue three simultaneous strategies: Prevention, deterrence, and defense. Missile defense is not the whole answer -- And it could even become part of the problem.
Online Contents | 2001|Keywords: Internationale Sicherheit -
9-11 and After - The Sentry's Solitude - The American imperium in the Arab-Muslim world has hatched a monster; primacy has begotten its nemesis. Pax Americana is here to stay -- But so too is the resistance to it, the uneasy mix in those lands of the need for the foreigner's order and the urge to lash out against it. George W. Bush, who grew up far removed from foreign places, must now take his country on a journey into an alien and difficult world.
Online Contents | 2001|Keywords: Internationale Sicherheit -
9. Tagung des Münsteraner Asien-Pazifik-Forums (MAPF): "50 Jahre Kriegsende Der Koreakrieg und die Folgen" Münster, 07.-08. Februar 2003
Online Contents | 2003|Keywords: Internationale Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.