Seite 1 von 235.385 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Schlagwörter: Governance of security, security regulation, security sector, security managers
  2.  

    Security Warning Life Cycle: Challenges and Panacea

    Freier Zugriff
    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Schlagwörter: Security; Security Dialogues; Security Warning; Usability; Usable Security;
  3.  

    Socio-technical systems cybersecurity framework

    Malatji, Masike / Von Solms, Sune / Marnewick, Annlizé | Emerald Group Publishing | 2019
    Schlagwörter: Information security, Security
  4.  

    The prospects of easier security for small organisations and consumers

    Clarke, Roger | Elsevier | 2015
    Schlagwörter: Data security, Information security, Baseline security, Security profile
  5.  

    Eliciting and refining requirements for comprehensible security

    Freier Zugriff
    Broadnax, B. / Birnstill, Pascal / Müller-Quade, J. et al. | Fraunhofer Publica | 2016
    Schlagwörter: information security, security requirements, comprehensible security
  6.  

    Personal Security within the Human Security Paradigm

    Gierszewski, Janusz | DataCite | 2017
    Schlagwörter: state security, human security, personal security
  7.  

    Personal Security: Current State and Development Prospects for the Reflection on Security of Individuals and Human Collectivitie

    Urbanek, Andrzej | DataCite | 2017
    Schlagwörter: personal security, structural security, human security
  8.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Schlagwörter: Information security, Security behaviours, Email security, Security training
  9.  

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Schlagwörter: Cyber security, Security statements
  10.  

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security
  11.  

    Weryfikacja protokołów zabezpieczających z uwzględnieniem opóźnień w sieci

    Szymoniak, Sabina | DataCite | 2016
    Schlagwörter: verification; security protocols; security
  12.  

    Conclusion

    Edgerton, Michael | Wiley | 2013
    Schlagwörter: maritime security, port security, design security, security risk
  13.  

    A standard for developing secure mobile applications

    Dye, Stephen M. / Scarfone, Karen | Elsevier | 2013
    Schlagwörter: Mobile device security, Mobile application security, Application security, Cyber security
  14.  

    Information Assets Security Management

    Cascarino, Richard E. | Wiley | 2015
    Schlagwörter: Information security, security management, data security, Information system security
  15.  

    OPSEC Model and Applications

    Akman, M. Kubilay | DataCite | 2018
    Schlagwörter: security studies, sociology of security, security management, information security, cyber security
  16.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  17.  

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Schlagwörter: Security, software security, security metrics, software security metrics, security requirements engineering
  18.  

    Youth Perceptions of Private Security Guard Industry in Russia

    Nalla, Mahesh K. / Gurinskaya, Anna / Rafailova, Diana | Taylor & Francis Verlag | 2017
    Schlagwörter: Private security guards, Russian private security guards, private security guard regulations, security guard professionalism, security guard effectiveness, security guard civility
  19.  

    Masking Proofs are Tight and How to Exploit it in Security Evaluations

    Freier Zugriff
    Grosso, Vincent / Standaert, François-Xavier | BASE | 2018
    Schlagwörter: Security level; Security evaluation
  20.  

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Schlagwörter: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics

Ergebnisse anzeigen: 10 | 20 | 50