Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
``A Blackwater Comparison'' - How Can We Blend the Best of Two Worlds for Fire Safety
British Library Conference Proceedings | 2006|Keywords: Wildland fire safety, Fire safety -
``Accidents and Emergencies: Welfare and Safety in Europe and North America, c. 1750-2000'' 9-11 September 2013, Oxford, UK
British Library Conference Proceedings | 2014|Keywords: Safety -
``Better Than Nothing'' Privacy with Bloom Filters: To What Extent?
British Library Conference Proceedings | 2012|Keywords: Database security -
``Break Our Steganographic System'' - The Ins and Outs of Organizing BOSS
British Library Conference Proceedings | 2011|Keywords: Computer security -
``Business Continuity and Information Security Maintenance'' Masters' Training Program
British Library Conference Proceedings | 2013|Keywords: Information security, Security education -
``Comply or Die'' Is Dead: Long Live Security-Aware Principal Agents
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
``Fairly Truthful'': The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure
British Library Conference Proceedings | 2013|Keywords: Computer security -
``Give Me Letters 2, 3 and 6!'': Partial Password Implementations and Attacks
British Library Conference Proceedings | 2013|Keywords: Data security -
``Instant-Ergonomics'' and the Illusion of Productivity
British Library Conference Proceedings | 2006|Keywords: System safety -
``IT'' Infrastructure Protection From Malicious Codes and Malware Protection System using Controlled Environment
British Library Conference Proceedings | 2012|Keywords: Information security -
``My Life Doesn't Have to Be an Open Book'': A Model to Help Designers to Enhance Privacy Controls on Social Network Sites
British Library Conference Proceedings | 2014|Keywords: Computer security -
``Ooh Aah... Just a Little Bit'' : A Small Amount of Side Channel Can Go a Long Way
British Library Conference Proceedings | 2014|Keywords: Computer security -
``Protection from half-criminal windows breakers to mass murderers with nuclear weapons'': Changes in the Norwegian authorities' discourses on the terrorism threat
British Library Conference Proceedings | 2009|Keywords: Industrial safety -
``Protection from half-criminal windows breakers to mass murderers with nuclear weapons'': Changes in the Norwegian authorities' discourses on the terrorism threat
British Library Conference Proceedings | 2009|Keywords: Industrial safety -
``Rank Correction'': A New Side-Channel Approach for Secret Key Recovery
British Library Conference Proceedings | 2011|Keywords: Computer security -
``SCRAM'' Scalable Risk Analysis and evaluation Method
British Library Conference Proceedings | 2007|Keywords: Industrial safety, System safety, Safety, Societal safety -
``She Wolves and Russian Brides'' - Women Enemies in war Propaganda''
British Library Conference Proceedings | 2010|Keywords: Computer security, Inforamtion security -
``Slow Is Fast'' for Wireless Sensor Networks in the Presence of Message Losses
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
``Technology Should Be Smarter Than This!'': A Vision for Overcoming the Great Authentication Fatigue
British Library Conference Proceedings | 2014|Keywords: Database security -
``The Four Most-Used Passwords Are Love, Sex, Secret, and God'': Password Security and Training in Different User Groups
British Library Conference Proceedings | 2013|Keywords: Computer security -
``To Share or not to Share'' in Client-Side Encrypted Clouds
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
``Trusted'' Computing Technologies Opportunities and Problems
British Library Conference Proceedings | 2006|Keywords: Computer security -
``Us'' and ``Them'': The impact of group identity on safety critical behaviour
British Library Conference Proceedings | 2009|Keywords: Industrial safety -
``Us'' and ``Them'': The impact of group identity on safety critical behaviour
British Library Conference Proceedings | 2009|Keywords: Industrial safety -
``Valuing'' Privacy While Exposing Data Utility
British Library Conference Proceedings | 2012|Keywords: Database security, Data security, Security data -
``Why Wasn't I Notified?'': Information Security Incident Reporting Demystified
British Library Conference Proceedings | 2012|Keywords: Computer security -
``Will Use It, Because I Want to Look Cool'' A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures
British Library Conference Proceedings | 2014|Keywords: Computer security -
`DNA-proofing' for Computer Systems - A New Approach to Computer Security?
British Library Conference Proceedings | 2000|Keywords: information security -
`I Didn't Buy it for Myself' Privacy and Ecommerce Personalization
British Library Conference Proceedings | 2003|Keywords: communications security -
`Masquerade' Attacks and a Process for Their Detection
British Library Conference Proceedings | 2004|Keywords: Information security -
`Profit by Safety' or Quackery in Biomedical Information Technology?
British Library Conference Proceedings | 1998|Keywords: computer safety, security -
`Risk Management' at the European Space Agency - Implementation aspects
British Library Conference Proceedings | 1999|Keywords: safety -
`Strong enterprise, weak government': energy policy making in China
British Library Conference Proceedings | 2008|Keywords: Energy security -
`TSUPDOOD? Repackaged Problems for You and MMI
British Library Conference Proceedings | 1995|Keywords: new security paradigms, security paradigms -
`Value of life' and insensitivity to quantity in contingent valuation judgements
British Library Conference Proceedings | 2000|Keywords: safety -
`Virtual' Security Teaching Techniques - Teaching IA methods using VMWare Teams
British Library Conference Proceedings | 2007|Keywords: Computer security -
`Who, When, and Where?' Location Proof Assertion for Mobile Devices
British Library Conference Proceedings | 2014|Keywords: Database security, Applications security -
^2^3^0^,^2^3^2Th in milk, meat, and grain in Korea
British Library Conference Proceedings | 2004|Keywords: Radiation safety -
+SAFE, V1.2: A Safety Extension to CMMI-DEV, V1.2
NTIS | 2007Keywords: Safety, Safety engineering, Safety management, Safety-critical products
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.