Seite 1 von 354.213 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Critiquing the regulation of private security in the United Kingdom: views from inside the sector

    Mawby, Rob / Gill, Martin | Taylor & Francis Verlag | 2017
    Schlagwörter: Governance of security, security regulation, security sector, security managers
  2.  

    Security Warning Life Cycle: Challenges and Panacea

    Freier Zugriff
    Samsudin, Nur Farhana / Zaaba, Zarul Fitri | BASE | 2017
    Schlagwörter: Security; Security Dialogues; Security Warning; Usability; Usable Security;
  3.  

    Socio-technical systems cybersecurity framework

    Malatji, Masike / Von Solms, Sune / Marnewick, Annlizé | Emerald Group Publishing | 2019
    Schlagwörter: Information security, Security
  4.  

    The prospects of easier security for small organisations and consumers

    Clarke, Roger | Elsevier | 2015
    Schlagwörter: Data security, Information security, Baseline security, Security profile
  5.  

    The design of phishing studies: Challenges for researchers

    Parsons, Kathryn / McCormac, Agata / Pattinson, Malcolm et al. | Elsevier | 2015
    Schlagwörter: Information security, Security behaviours, Email security, Security training
  6.  

    The Study on Network Security Strategy Based on Security Evaluation

    Nationallizenz
    Bi, Yan | Trans Tech Publications | 2014
    Schlagwörter: Security Evaluation, Network Security, Security Strategy
  7.  

    Designed on Information Security Systems for Mobile Databases

    Nationallizenz
    Li, Feng / Wang, Hai Ying | Trans Tech Publications | 2014
    Schlagwörter: Network Security, Information Security, Data Security, Security Systems
  8.  

    Consumer security behaviors and trust following a data breach

    Curtis, Shelby R. / Carre, Jessica Rose / Jones, Daniel Nelson | Emerald Group Publishing | 2018
    Schlagwörter: Cyber security, Security statements
  9.  

    The impact of repeated data breach events on organisations’ market value

    Schatz, Daniel / Bashroush, Rabih | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security
  10.  

    The Design of the Enterprise Network Security Solutions

    Nationallizenz
    Liu, Qing Li / Wang, Xiao Qing | Trans Tech Publications | 2014
    Schlagwörter: Security, Network Security, Windows Security
  11.  

    Security behaviors of smartphone users

    Das, Amit / Khan, Habib Ullah | Emerald Group Publishing | 2016
    Schlagwörter: Security, Information security
  12.  

    A standard for developing secure mobile applications

    Dye, Stephen M. / Scarfone, Karen | Elsevier | 2013
    Schlagwörter: Mobile device security, Mobile application security, Application security, Cyber security
  13.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Schlagwörter: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  14.  

    Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

    Banerjee, Chitresh / Banerjee, Arpita / Sharma, S.K. | IOS Press | 2017
    Schlagwörter: Security, software security, security metrics, software security metrics, security requirements engineering
  15.  

    Youth Perceptions of Private Security Guard Industry in Russia

    Nalla, Mahesh K. / Gurinskaya, Anna / Rafailova, Diana | Taylor & Francis Verlag | 2017
    Schlagwörter: Private security guards, Russian private security guards, private security guard regulations, security guard professionalism, security guard effectiveness, security guard civility
  16.  

    Novel efficient techniques for real-time cloud security assessment

    Modic, Jolanda / Trapero, Ruben / Taha, Ahmed et al. | Elsevier | 2016
    Schlagwörter: Cloud security, Security quantification, Security evaluation, Security level agreements, Security metrics
  17.  

    Port security training and education in Europe—a framework and a roadmap to harmonization

    Urciuoli, Luca | Taylor & Francis Verlag | 2016
    Schlagwörter: Port security, port security training, security training Europe, security education Europe, port security roadmap
  18.  

    Speculations on the science of web user security

    Sandhu, Ravi | Elsevier | 2012
    Schlagwörter: Web user security, Security science, Cyber security
  19.  

    An East Asian security community: Japan, Australia and resources as 'security'

    Weeks, Donna | Taylor & Francis Verlag | 2011
    Schlagwörter: security community, East Asian security, resources security
  20.  

    An architectural systems engineering methodology for addressing cyber security

    Bayuk, Jennifer L. / Horowitz, Barry M. | Wiley | 2011
    Schlagwörter: security architecture, security metrics, systems security

Ergebnisse anzeigen: 10 | 20 | 50