Seite 1 von 42.845 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Information Assets Security Management

    Cascarino, Richard E. | Wiley | 2015
    Schlagwörter: Information security, security management, data security, Information system security
  2.  

    Conclusion

    Edgerton, Michael | Wiley | 2013
    Schlagwörter: maritime security, port security, design security, security risk
  3.  

    Securing the Clouds

    Methodologies and Practices
    Liu, Simon | Wiley | 2016
    Schlagwörter: cloud security, security concerns, cloud security management, security audit, security policy
  4.  

    The 21st Century CISO

    Freier Zugriff
    Harkins, Malcolm | Springer Verlag | 2013
    Schlagwörter: Security Issue, Security Group, Security Investment, Security Organization, Security Initiative, Security
  5.  

    Security Systems Engineering

    Jacobs, Stuart | Wiley | 2011
    Schlagwörter: security model, security policy, security process management, security standards, security systems engineering
  6.  

    Software Defined Mobile Network Security

    Abro, Ahmed Bux | Wiley | 2015
    Schlagwörter: Security, Security architecture, Mobile network security
  7.  

    Introduction

    Schneier, Bruce | Wiley | 2015
    Schlagwörter: digital security, internet security, security theory
  8.  

    Secure OS

    Grimes, Roger A. | Wiley | 2017
    Schlagwörter: computer security, information technology security evaluation, Security Compliance Manager, security configuration tools, security consortiums
  9.  

    Securing Management and Managing Security

    Jacobs, Stuart | Wiley | 2011
    Schlagwörter: operational security, security management, security mechanisms, security policies, security systems design
  10.  

    Model of the Information System in the Organization for Controlling Current Level of Information Security

    Stanik, Jerzy / Kiedrowicz, Maciej / Napiórkowski, Jarosław | Springer Verlag | 2019
    Schlagwörter: Security subject, Security object, Security environment, Security configurations, Controlling security level
  11.  

    Profile

    Gary McGraw
    Grimes, Roger A. | Wiley | 2017
    Schlagwörter: Building Security in Maturity Model, computer security, security vulnerabilities, software security
  12.  

    INTRODUCTION

    Jacobs, Stuart | Wiley | 2013
    Schlagwörter: information security, security management, security mechanisms
  13.  

    Profile

    Window Snyder
    Grimes, Roger A. | Wiley | 2017
    Schlagwörter: computer security, security bug, security design lifecycle, Windows security
  14.  

    IT Security Best Corporate Governance Practices

    Lipman, Frederick D. / Keith Lipman, L. | Wiley | 2015
    Schlagwörter: information technology security, security policy, electronic data security, security consultants
  15.  

    Transportation Security Considerations

    Wiley | 2010
    Schlagwörter: transportation security considerations, security regulations, security prioritization process, transportation security elements, security plans
  16.  

    Communications Security in Embedded Systems

    Chalouf, Mohamed Aymen | Wiley | 2013
    Schlagwörter: Security attacks, Security implementation, Security services, Security techniques
  17.  

    Foundation Concepts

    Jacobs, Stuart | Wiley | 2011
    Schlagwörter: information security, security concepts, security goals
  18.  

    Toward a New Framework for Information Security?

    Parker, Donn B. | Wiley | 2015
    Schlagwörter: information security, security practitioners, security framework, CIA security
  19.  

    SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS

    Jacobs, Stuart | Wiley | 2013
    Schlagwörter: information security management frameworks, security management, security of information systems, security policies
  20.  

    Design and Realization of Testbeds for Security Research in the Industrial Internet of Things

    Tippenhauer, Nils Ole | Springer Verlag | 2019
    Schlagwörter: ICS security, IIoT security, Applied security, Systems and Data Security, Crime Control and Security, Security Science and Technology

Ergebnisse anzeigen: 10 | 20 | 50