1–50 of 616,154 hits

Sort by: Relevancy | Date newest | Title A-Z

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Sicherheit

    V & R unipress GmbH | TIBKAT | 2017
    Keywords: Sicherheit, Innere Sicherheit
  2.  

    Information security as a national security component

    Alguliyev, Rasim M. / Imamverdiyev, Yadigar N. / Mahmudov, Rasim Sh. et al. | Taylor & Francis Verlag | 2021
    Keywords: National security, information security, military security, economic security, energy security
  3.  

    Security Warning Life Cycle: Challenges and Panacea

    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Keywords: Security, Security Dialogues, Security Warning, Usable Security
  4.  

    Deciphering China in the Middle East

    Rózsa, Erzsébet | EU Bookshop | 2020
    Keywords: europäische Sicherheit, internationale Sicherheit, Sicherheit einer geografischen Region
  5.  

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Keywords: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics
  6.  

    Review on soft target/public space protection guidance

    Karlos, Vasilis / Larcher, Martin / Solomos, George et al. | EU Bookshop | 2018
    Keywords: europäische Sicherheit, internationale Sicherheit, Sicherheit einer geografischen Region, öffentliche Sicherheit
  7.  

    Water and U.S. national security

    Busby, Joshua / Council on Foreign Relationspublisher | TIBKAT | 2017
    Keywords: Security, International, National security, Water security
  8.  

    Cloud Infrastructure Security

    GhasemiGol, Mohammad | Wiley | 2019
    Keywords: Information security, Infrastructure security, Virtualization Security, Hypervisor Security
  9.  

    Die Erfindung der Sicherheit : zehn Geniestreiche, die unser Leben verändert haben

    Brauner, Silvia / Thissen, Karin / Rosik, Katrin et al. | TIBKAT | 2017
    Keywords: Sicherheit, Technische Sicherheit
  10.  

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Keywords: Governance of security, security regulation, security sector, security managers
  11.  

    Sicherheit : ein (un)stillbares Grundbedürfnis

    Frevel, Bernhard | TIBKAT | 2016
    Keywords: Sicherheit, Innere Sicherheit
  12.  

    Automating Security Risk and Requirements Management for Cyber-Physical Systems

    Hansch, Gerhard | Fraunhofer Publica | 2020
    Keywords: security risk management, risk-driven security, security requirements, automotive security, CPS security, IIoT security, OT security
  13.  

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Keywords: state security, human security, personal security
  14.  

    Personal Security: Current State and Development Prospects for the Reflection on Security of Individuals and Human Collectivitie

    Urbanek, Andrzej | DataCite | 2017
    Keywords: personal security, structural security, human security
  15.  

    Defence

    TIBKAT | Nachgewiesen 8.1977 - 24.1993,7
    Keywords: Kollektive Sicherheit, Internationale Sicherheit
  16.  

    Conclusion

    Edgerton, Michael | Wiley | 2013
    Keywords: maritime security, port security, design security, security risk
  17.  

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Keywords: Security, software security, security metrics, software security metrics, security requirements engineering
  18.  

    Security behaviors of smartphone users

    Das, Amit / Khan, Habib Ullah | Emerald Group Publishing | 2016
    Keywords: Security, Information security
  19.  

    Sicherheit und Wirtschaftlichkeit schneller und-oder großer Handelsschiffe : zur Begutachtung

    Arbeitsbericht.
    TIBKAT | Nachgewiesen 1974 -
    Keywords: Technische Sicherheit, Sicherheit
  20.  

    Vom Parkassistenten hin zum selbstparkenden Auto

    Barth, H. / Mathes, J. / VDI-Gesellschaft Fahrzeug- und Verkehrstechnik et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  21.  

    Prazision von Navigationsanzeigen im kontaktanalogen Head-up Display

    Pfannmuller, L. / Walter, M. / Bengler, K. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  22.  

    Trans-state security complexes and security governance in West Africa

    Obamamoye, Babatunde F. | Taylor & Francis Verlag | 2020
    Keywords: Security complexes, security governance, security region, security space
  23.  

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Keywords: Security, Information security
  24.  

    The character and value of vernacular security: the case of South West Cameroon

    Baker, Bruce / Lekunze, Manu | Taylor & Francis Verlag | 2019
    Keywords: Vernacular security, contested security, security studies, security in Cameroon
  25.  

    Equivalent linearization method using Gaussian mixture (GM-ELM) for nonlinear random vibration analysis

    Wang, Ziqi / Song, Junho | Online Contents | 2017
    Keywords: Sicherheit, Technische Sicherheit
  26.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Keywords: Information security, Security behaviours, Email security, Security training
  27.  

    Eliciting and refining requirements for comprehensible security

    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Keywords: information security, security requirements, comprehensible security
  28.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Keywords: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  29.  

    Sensorsysteme fur Car2X - Herausforderungen fur die Fahrzeugarchitektur

    Gunthner, S. / Schmid, B. / Stahlin, U. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  30.  

    Automatisierung: Interpretation von Kreuzungen mit Ampeln

    Hegemann, S. / Natoli, A. / Arbitmann, M. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  31.  

    Nutzerorientierte Interaktionsgestaltung beim hochautomatisierten Fahren

    Albert, M. / Wimmer, M. / Bengler, K. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  32.  

    Importance of Mobile Security

    Priyanshi Gupta / Latika Kharb | BASE | 2019
    Keywords: Computer Security, Mobile security, data security
  33.  

    Security Protocols for Mobile Communications

    Divya Priyadharshini, M. / Divya, R. / Ponmurugan, P. et al. | Wiley | 2020
    Keywords: security protocols, Lora security, security threats, 5G security, network security
  34.  

    Information and Economic Security

    Dou, Henri / Juillet, Alain / Clerc, Philippe | Wiley | 2019
    Keywords: immaterial security, information security, material security, physical security
  35.  

    Anhangerrangierassistent - Softwareentwicklung einer neuen Assistenzfunktion

    Huger, P. / Kirchner, A. / Katzwinkel, R. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  36.  

    EU-Projekt „AdaptIVe„ - Ansatze fur hochautomatisches Fahren

    Langenberg, J. / Bartels, A. / Etemad, A. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  37.  

    Erkennung und Warnung visuell abgelenkter Fahrer

    Krautter, W. / Korthauer, A. / VDI-Gesellschaft Fahrzeug- und Verkehrstechnik et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  38.  

    Entwicklungsschritte des 24 GHz Heckradars als Volumeninnovation

    Max, S. / Jerhot, J. / Brosig, S. et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  39.  

    Fahrerassistenzsystem zur vorausschauenden energieeffizienten Geschwindigkeitsregelung speziell fur Elektrofahrzeuge

    Schwickart, T. / Voos, H. / VDI-Gesellschaft Fahrzeug- und Verkehrstechnik et al. | British Library Conference Proceedings | 2014
    Keywords: Integrierte Sicherheit, Sicherheit
  40.  

    OPSEC Model and Applications

    Akman, M. Kubilay | DataCite | 2018
    Keywords: security studies, sociology of security, security management, information security, cyber security
  41.  

    Masking Proofs are Tight and How to Exploit it in Security Evaluations

    Grosso, Vincent / Standaert, François-Xavier | BASE | 2018
    Keywords: Security level; Security evaluation
  42.  

    Selected problems of the process of ensuring national security

    Marek Kulisz | DOAJ | 2018
    Keywords: security, security management, security strategy
  43.  

    History and Generations of Security Protocols

    Keswani, Bright / Keswani, Poonam / Purohit, Rakhi | Wiley | 2020
    Keywords: Network security, security protocols, security techniques
  44.  

    The Design of the Enterprise Network Security Solutions

    National licence
    Liu, Qing Li / Wang, Xiao Qing | Trans Tech Publications | 2014
    Keywords: Security, Network Security, Windows Security
  45.  

    Was ist uns "Sicherheit" wert - und Sicherheit wovor?: Über die Sicherheit des Bürgers im Alltag

    Wiemken, Uwe | Fraunhofer Publica | 2016
    Keywords: innere Sicherheit, äußere Sicherheit
  46.  

    Schwerpunkt Sicherheit

    S. Fischer Verlag | TIBKAT | 2016
    Keywords: Sicherheit, Öffentliche Sicherheit
  47.  

    On the design of secure primitives for real world applications

    Sklavos, Nicolas / Kaaniche, Nesrine | Elsevier | 2020
    Keywords: Hardware security, Systems security, Security engineering, Computers and networks security
  48.  

    Security in Agile Software Development: A Practitioner Survey

    Rindell, Kalle / Ruohonen, Jukka / Holvitie, Johannes et al. | BASE | 2020
    Keywords: security engineering, software security, security standards, security assurance
  49.  

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Keywords: Cyber security, Security statements
  50.  

    OBJECTIVE SECURITY

    Eugen SITEANU | DOAJ | 2019
    Keywords: objective security, subjective security, security science, security phenomenology, security philosophy method

Number of results: 10 | 20 | 50

Feedback