Seite 1 von 741.194 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Schlagwörter: Governance of security, security regulation, security sector, security managers
  2.  

    Security Warning Life Cycle: Challenges and Panacea

    Freier Zugriff
    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Schlagwörter: Security; Security Dialogues; Security Warning; Usability; Usable Security;
  3.  

    The prospects of easier security for small organisations and consumers

    Clarke, Roger | Elsevier | 2015
    Schlagwörter: Data security, Information security, Baseline security, Security profile
  4.  

    Eliciting and refining requirements for comprehensible security

    Freier Zugriff
    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Schlagwörter: information security, security requirements, comprehensible security
  5.  

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Schlagwörter: state security, human security, personal security
  6.  

    Personal Security: Current State and Development Prospects for the Reflection on Security of Individuals and Human Collectivitie

    Urbanek, Andrzej | DataCite | 2017
    Schlagwörter: personal security, structural security, human security
  7.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Schlagwörter: Information security, Security behaviours, Email security, Security training
  8.  

    Schutz aktuell : Magazin für Sicherheit

    TIBKAT | 4.1989,2 - 15.2000,2[?]
    Schlagwörter: Technische Sicherheit, Sicherheit
  9.  

    Designed on Information Security Systems for Mobile Databases

    Nationallizenz
    Li, Feng / Wang, Hai Ying | Trans Tech Publications | 2014
    Schlagwörter: Network Security, Information Security, Data Security, Security Systems
  10.  

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Schlagwörter: Cyber security, Security statements
  11.  

    Socio-technical systems cybersecurity framework

    Malatji, Masike / Von Solms, Sune / Marnewick, Annlizé | Emerald Group Publishing | 2019
    Schlagwörter: Information security, Security
  12.  

    Sicherheit

    Hoch, Gero / Schröteler- von Brandt, Hildegard / Schwarz, Angela | TIBKAT | 2017
    Schlagwörter: Sicherheit, Innere Sicherheit
  13.  

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security
  14.  

    Weryfikacja protokołów zabezpieczających z uwzględnieniem opóźnień w sieci

    Szymoniak, Sabina | DataCite | 2016
    Schlagwörter: verification; security protocols; security
  15.  

    The Design of the Enterprise Network Security Solutions

    Nationallizenz
    Liu, Qing Li / Wang, Xiao Qing | Trans Tech Publications | 2014
    Schlagwörter: Security, Network Security, Windows Security
  16.  

    The Study on Network Security Strategy Based on Security Evaluation

    Nationallizenz
    Bi, Yan | Trans Tech Publications | 2014
    Schlagwörter: Security Evaluation, Network Security, Security Strategy
  17.  

    Super-resolution imaging applied to moving targets in high dynamics scenes [8899-46]

    Mise, O. / Breckon, T.P. | British Library Conference Proceedings | 2013
    Schlagwörter: Quantum security, Security, Information security
  18.  

    An approach to experimental photonic quantum digital signatures in fiber [8899-35]

    Donaldson, R.J. / Collins, R.J. / Dunjko, V. et al. | British Library Conference Proceedings | 2013
    Schlagwörter: Quantum security, Security, Information security
  19.  

    Essential elements lacking in security proofs for quantum key distribution (Invited Paper) [8899-21]

    Yuen, H.P. | British Library Conference Proceedings | 2013
    Schlagwörter: Quantum security, Security, Information security
  20.  

    Technologies for blue-green underwater optical communications (Invited Paper) [8899-14]

    Hollins, R. / Rudge, A. / Bennett, S. | British Library Conference Proceedings | 2013
    Schlagwörter: Quantum security, Security, Information security

Ergebnisse anzeigen: 10 | 20 | 50