Seite 1 von 166.353 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    The 21st Century CISO

    Freier Zugriff
    Harkins, Malcolm | Springer Verlag | 2013
    Schlagwörter: Security Issue, Security Group, Security Investment, Security Organization, Security Initiative, Security
  2.  

    Model of the Information System in the Organization for Controlling Current Level of Information Security

    Stanik, Jerzy / Kiedrowicz, Maciej / Napiórkowski, Jarosław | Springer Verlag | 2019
    Schlagwörter: Security subject, Security object, Security environment, Security configurations, Controlling security level
  3.  

    Design and Realization of Testbeds for Security Research in the Industrial Internet of Things

    Tippenhauer, Nils Ole | Springer Verlag | 2019
    Schlagwörter: ICS security, IIoT security, Applied security, Systems and Data Security, Crime Control and Security, Security Science and Technology
  4.  

    The Importance of Information Security Awareness for the Success of Business Enterprises

    Yildirim, Ebru | Springer Verlag | 2016
    Schlagwörter: Information security, Information security management, Security awareness, Security dimensions, Security education, Systems and Data Security
  5.  

    Standardization – ensuring quality and efficiency

    von Faber, Eberhard / Behnsen, Wolfgang | Springer Verlag | 2017
    Schlagwörter: Information Security, Security Service, Security Measure, Security Concern, Systems and Data Security, Security
  6.  

    Building a security reference architecture for cloud systems

    Fernandez, Eduardo B. / Monge, Raul / Hashizume, Keiko | Springer Verlag | 2015
    Schlagwörter: Security reference architecture, Security patterns, Security requirements, IaaS security
  7.  

    A Security Vulnerability Threat Classification Method

    Hou, Yuanwei / Ren, Xingzhang / Hao, Yongle et al. | Springer Verlag | 2017
    Schlagwörter: Network security, Security vulnerability, Security vulnerability management, Security vulnerability assessment
  8.  

    Routine – day-to-day security management using ESARIS

    von Faber, Eberhard / Behnsen, Wolfgang | Springer Verlag | 2017
    Schlagwörter: Security Measure, Security Management, Security Standard, Systems and Data Security, Security
  9.  

    Subject (from pain to pleasure)

    von Faber, Eberhard / Behnsen, Wolfgang | Springer Verlag | 2017
    Schlagwörter: Security Requirement, Security Measure, Security Management, Systems and Data Security, Security
  10.  

    IT-Security in Railway Signalling Systems

    Schlehuber, Christian / Tews, Erik / Katzenbeisser, Stefan | Springer Verlag | 2014
    Schlagwörter: Security Requirement, Security Level, Security Standard, Safety Critical System, Systems and Data Security
  11.  

    A study on security strategy in ICT convergence environment

    Lee, Chang-Moo / Chang, Hangbae | Springer Verlag | 2014
    Schlagwörter: Security characteristic, Security level, Security advancement step, Security strategy
  12.  

    Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things

    Harbi, Yasmine / Aliouat, Zibouda / Harous, Saad et al. | Springer Verlag | 2018
    Schlagwörter: Security, Security requirements, Security attacks
  13.  

    SOC- and SIC-Based Information Security Monitoring

    Miloslavskaya, Natalia | Springer Verlag | 2017
    Schlagwörter: Information security, Information security incidents, Information security monitoring, Security Operations Center, Security Intelligence Center
  14.  

    ESARIS Security Taxonomy

    von Faber, Eberhard / Behnsen, Wolfgang | Springer Verlag | 2017
    Schlagwörter: Security Measure, Security Aspect, Security Standard, Systems and Data Security, Security
  15.  

    Main building blocks and general set-up

    von Faber, Eberhard / Behnsen, Wolfgang | Springer Verlag | 2017
    Schlagwörter: Security Requirement, Security Measure, Security Manager, Systems and Data Security, Security
  16.  

    Extension of ISO/IEC27001 to Mobile Devices Security Management

    Freier Zugriff
    Zhu, Xiaobo / Zhu, Yunqian | Springer Verlag | 2019
    Schlagwörter: Mobile security, Information security, Systems and Data Security
  17.  

    Cloud Storage Security Architecture

    Galibus, Tatiana / Krasnoproshin, Viktor V. / de Oliveira Albuquerque, Robson et al. | Springer Verlag | 2016
    Schlagwörter: Cloud security model, Security architecture, Security optimization, Security testing, Systems and Data Security
  18.  

    Implementing an Information Security Program

    Glantz, Cliff / Lenaeus, Joseph / Landine, Guy et al. | Springer Verlag | 2017
    Schlagwörter: Information security, Security controls, Information security management system, Risk-based security, Security, Safety in Chemistry, Dangerous Goods
  19.  

    Key Concepts and Principles

    Freier Zugriff
    Rao, Umesh Hodeghatta / Nayak, Umesha | Springer Verlag | 2014
    Schlagwörter: Information Security, Security Control, Security Architecture, Security
  20.  

    Security threats to critical infrastructure: the human factor

    Freier Zugriff
    Ghafir, Ibrahim / Saleem, Jibran / Hammoudeh, Mohammad et al. | Springer Verlag | 2018
    Schlagwörter: Critical infrastructure security, Security awareness, Cyber security training, Work-based security training, Security threats against critical infrastructure

Ergebnisse anzeigen: 10 | 20 | 50