Year of publication
Type of media
Subject
Type of material
Language
Synonyms were used for: Sicherheitsrichtlinie
Search without synonyms: keywords:(Sicherheitsrichtlinie)
Used synonyms:
- security guidelines
- security policies
- security richtlinie
- security rules
- sicherheits policies
-
‘War on Terror’ in our backyard: effects of framing and violent ISIS propaganda on anti-Muslim prejudice
Taylor & Francis Verlag | 2016|Keywords: security policies -
Security rules and banned items in psychiatric acute admission wards in Athens, Greece
Wiley | 2010|Keywords: security rules -
Determinants of early conformance with information security policies
Elsevier | 2017|Keywords: Mandatory security policies -
Employees’ adherence to information security policies: An exploratory field study
Elsevier | 2013|Keywords: Information systems security policies, Employees’ compliance of information systems security policies, Multi-theory based model to explain employees’ adherence to information security policies -
Secure States versus Secure Executions
From Access Control to Flow ControlSpringer Verlag | 2013|Keywords: Security policies -
SECURITATEA REȚELELOR INFORMATICE
Free accessDOAJ | 2018|Keywords: network, cyber attacks, vulnerabilities, threats, security risks, security policies, security management. -
AppGuard – Fine-Grained Policy Enforcement for Untrusted Android Applications
Springer Verlag | 2014|Keywords: Security policies -
The Security of Information Systems in Greek Hospitals
Springer Verlag | 2013|Keywords: security policies -
Dynamic Deployment and Monitoring of Security Policies
Springer Verlag | 2015|Keywords: Security policies -
Security Awareness Level Evaluation of Healthcare Participants Through Educational Games
Free accessDOAJ | 2021|Keywords: Serious games for information security; education; training; awareness; information security policies; security incidents; healthcare -
A Formal Approach to Automatic Testing of Security Policies Specified in XACML
Springer Verlag | 2015|Keywords: Security Rules -
Rewrite Specifications of Access Control Policies in Distributed Environments
Springer Verlag | 2011|Keywords: Security Policies -
“I do it because they do it”: Social-Neutralisation in Information Security Practices of Saudi Medical Interns
Springer Verlag | 2020|Keywords: Information security policies -
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android
Free accessSpringer Verlag | 2012|Keywords: security policies -
A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications
Springer Verlag | 2018|Keywords: Security policies -
An Identification of Variables Influencing the Establishment of Information Security Culture
Springer Verlag | 2015|Keywords: Security policies -
Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics
Springer Verlag | 2015|Keywords: Security policies -
Specification of Information Flow Security Policies in Model-Based Systems Engineering
Springer Verlag | 2018|Keywords: Security policies -
Semantic Exploration of Distributed AR Services
Springer Verlag | 2017|Keywords: Security policies
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.