Page 1 from 225,933 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources


Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security

    Security Warning Life Cycle: Challenges and Panacea

    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Keywords: Security, Security Dialogues, Security Warning, Usable Security

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Keywords: Governance of security, security regulation, security sector, security managers

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Keywords: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics

    The prospects of easier security for small organisations and consumers

    Clarke, Roger | Elsevier | 2015
    Keywords: Data security, Information security, Baseline security, Security profile

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Keywords: Information security, Security behaviours, Email security, Security training

    Security behaviors of smartphone users

    Das, Amit / Khan, Habib Ullah | Emerald Group Publishing | 2016
    Keywords: Security, Information security

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Keywords: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center

    The character and value of vernacular security: the case of South West Cameroon

    Baker, Bruce / Lekunze, Manu | Taylor & Francis Verlag | 2019
    Keywords: Vernacular security, contested security, security studies, security in Cameroon

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Keywords: Security, software security, security metrics, software security metrics, security requirements engineering

    Port security training and education in Europe—a framework and a roadmap to harmonization

    Urciuoli, Luca | Taylor & Francis Verlag | 2016
    Keywords: Port security, port security training, security training Europe, security education Europe, port security roadmap

    A Survey on Systems Security Metrics

    Pendleton, Marcus / Garcia-Lebron, Richard / Cho, Jin-Hee et al. | Online Contents | 2017
    Keywords: quantitative security, security measurement, security foundation, Security metrics

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Keywords: Security, Information security

    Socio-technical systems cybersecurity framework

    Malatji, Masike / Von Solms, Sune / Marnewick, Annlizé | Emerald Group Publishing | 2019
    Keywords: Information security, Security

    Designed on Information Security Systems for Mobile Databases

    National licence
    Li, Feng / Wang, Hai Ying | Trans Tech Publications | 2014
    Keywords: Network Security, Information Security, Data Security, Security Systems

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Keywords: Cyber security, Security statements

    Countering code injection attacks: a unified approach

    Mitropoulos, Dimitris / Karakoidas, Vassilios / Louridas, Panagiotis et al. | Emerald Group Publishing | 2011
    Keywords: Information security, Internet security, Security, Computer security, Data security


    Eugen SITEANU | DOAJ | 2019
    Keywords: objective security, subjective security, security science, security phenomenology, security philosophy method

    Importance of Mobile Security

    Priyanshi Gupta / Latika Kharb | BASE | 2019
    Keywords: Computer Security, Mobile security, data security

    The Design of the Enterprise Network Security Solutions

    National licence
    Liu, Qing Li / Wang, Xiao Qing | Trans Tech Publications | 2014
    Keywords: Security, Network Security, Windows Security

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, Mark / Coles-Kemp, Lizzie | Elsevier | 2019
    Keywords: Security studies, Usable security, Information security messaging, Ontological security, Information security management

Number of results: 10 | 20 | 50