Seite 1 von 108.266 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Synonyme wurden verwendet für: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Security Warning Life Cycle: Challenges and Panacea

    Freier Zugriff
    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Schlagwörter: Security; Security Dialogues; Security Warning; Usability; Usable Security;
  2.  

    The prospects of easier security for small organisations and consumers

    Clarke, Roger | Elsevier | 2015
    Schlagwörter: Data security, Information security, Baseline security, Security profile
  3.  

    Eliciting and refining requirements for comprehensible security

    Freier Zugriff
    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Schlagwörter: information security, security requirements, comprehensible security
  4.  

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Schlagwörter: state security, human security, personal security
  5.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Schlagwörter: Information security, Security behaviours, Email security, Security training
  6.  

    Information Assets Security Management

    Cascarino, Richard E. | Wiley | 2015
    Schlagwörter: Information security, security management, data security, Information system security
  7.  

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Schlagwörter: Cyber security, Security statements
  8.  

    Socio-technical systems cybersecurity framework

    Malatji, Masike / Von Solms, Sune / Marnewick, Annlizé | Emerald Group Publishing | 2019
    Schlagwörter: Information security, Security
  9.  

    A standard for developing secure mobile applications

    Dye, Stephen M. / Scarfone, Karen | Elsevier | 2013
    Schlagwörter: Mobile device security, Mobile application security, Application security, Cyber security
  10.  

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, Mark / Coles-Kemp, Lizzie | Elsevier | 2019
    Schlagwörter: Security studies, Usable security, Information security messaging, Ontological security, Information security management
  11.  

    Privacy-respecting smart video surveillance based on usage control enforcement

    Freier Zugriff
    Birnstill, Pascal | Fraunhofer Publica | 2016
    Schlagwörter: Sicherheit
  12.  

    Masking Proofs are Tight and How to Exploit it in Security Evaluations

    Freier Zugriff
    Grosso, Vincent / Standaert, François-Xavier | BASE | 2018
    Schlagwörter: Security level; Security evaluation
  13.  

    Load Shedding in Data Stream Management Systems Using Application Semantics

    Adaikkalavan, R. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  14.  

    EXPLORE: A Novel Decision Tree Classification Algorithm

    Islam, M.Z. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  15.  

    Whither BNCOD and the UK Database Community

    Jeffery, K.G. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  16.  

    Securing the Clouds

    Methodologies and Practices
    Liu, Simon | Wiley | 2016
    Schlagwörter: cloud security, security concerns, cloud security management, security audit, security policy
  17.  

    Uses of Peer Assessment in Database Teaching and Learning

    Paterson, J. / Wilson, J.N. / Leimich, P. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  18.  

    Issues of Flash-Aware Buffer Management for Database Systems

    Ou, Y. / Harder, T. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  19.  

    Test Data Provisioning for Database-Driven Applications

    Haller, K. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  20.  

    Efficient Model Selection for Large-Scale Nearest-Neighbor Data Mining

    Hamerly, G. / Speegle, G. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data

Ergebnisse anzeigen: 10 | 20 | 50