Seite 1 von 201.048 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    2017 Emerging Technology Domains Risk Survey

    D. Klinedinst / J. Land / K. O'Meara | NTIS | 2017
    Schlagwörter: Information security, Homeland Security
  2.  

    Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures

    A. Roque / C. Cunningham | NTIS | 2016
    Schlagwörter: Security failures, Security, Cyber security
  3.  

    Security Engineering Project

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Information security, Cyber security, System aware security
  4.  

    Dependence-Based Anomaly Detection Methodologies

    D. Yao | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, Network security, System security
  5.  

    National Strategy to Secure Cyberspace

    K. T. Schwalm | NTIS | 2006
    Schlagwörter: Security, National security, Information security, Data processing security, Cyber security
  6.  

    Facility Security: Greater Outreach by DHS on Standards and Management Practices Could Benefit Federal Agencies

    NTIS | 2013
    Schlagwörter: Security standards, Physical security programs, Security practices
  7.  

    Independent Assessment of the Afghan National Security Forces

    J. Schroden / C. Norman / J. Meyerle et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel, Ansf(Afghan national security forces)
  8.  

    Security Engineering

    B. Horowitz | NTIS | 2012
    Schlagwörter: Computer security, Cyber security, System aware security
  9.  

    Pantex Falling Man - Independent Review Panel Report

    Bertolini L. / Brannon N. / Olsen J. et al. | NTIS | 2014
    Schlagwörter: Consolidated Nuclear Security (CNS), National Nuclear Security Administration (NNSA)
  10.  

    Summary of Independent Assessment of the Afghan National Security Forces

    J. Schroden / C. Norman / J. Meyerle et al. | NTIS | 2014
    Schlagwörter: National security, Security personnel
  11.  

    Cyber Threat Metrics

    J. Michalski / C. Veitch / M. Mateski et al. | NTIS | 2012
    Schlagwörter: Computer security, Data processing security, Security
  12.  

    Untying Our Hands: Reconsidering Cyber as a Separate Instrument of National Power

    C. Priechenfried | NTIS | 2017
    Schlagwörter: Cyber security
  13.  

    2011 Biometrics Conference Held in Arlington, Virginia on February 23-24, 2011

    NTIS | 2011
    Schlagwörter: Biometric security, Homeland security, Security personnel
  14.  

    Range Flight Safety Requirements

    C. E. Loftin / S. M. Hudson | NTIS | 2018
    Schlagwörter: Transportation Safety, Flight safety, Range safety, Safety
  15.  

    Comprehensive Approach to Improving U.S. Security Force Assistance Efforts

    T. Baginski / B. J. Clark / F. Donovan et al. | NTIS | 2009
    Schlagwörter: National security, Security personnel, Security, Security force assistance
  16.  

    Security Issues for Cloud Computing

    K. Hamlen / M. Kantarcioglu / L. Khan et al. | NTIS | 2010
    Schlagwörter: Data processing security, Computer network security, Security
  17.  

    Computing Science: The Robustness of Google CAPTCHAs

    A. S. El Ahmad / J. Yan / M. Tayara | NTIS | 2011
    Schlagwörter: Computer security, Internet security, Security engineering
  18.  

    Hammer and the Anvil: The Need for A Comprehensive Southwest Border Security Strategy

    J. D. Harris | NTIS | 2010
    Schlagwörter: Border security, Homeland security, National security
  19.  

    Formal Foundations for Hierarchical Safety Cases

    E. Denney / G. Pai / I. Whiteside | NTIS | 2015
    Schlagwörter: Transportation Safety, Safety management, Safety factors, Aircraft safety

Ergebnisse anzeigen: 10 | 20 | 50