Search

Your search keyword '"SECURITY POLICY"' showing total 1,813 results

Search Constraints

Start Over You searched for: Descriptor "SECURITY POLICY" Remove constraint Descriptor: "SECURITY POLICY" Publication Type eBooks Remove constraint Publication Type: eBooks
1,813 results on '"SECURITY POLICY"'

Search Results

1. Graph-Powered Mining and Analysis of SELinux Security Policies

2. A SLAHP in the Face of DLL Search Order Hijacking

3. New ASMS Architecture in the Mobile Agent System to Protect the Code and Data of an Agent

5. Towards Designing Energy-Aware Cybersecurity Policies

8. Secure Deployment of IOT Devices

9. Friedensgutachten 2023

10. Identity Authentication Protocols for Greenhouse Environmental Monitoring System Based on Internet of Things

11. Research of Ways to Increase the Efficiency of Functioning Between Firewalls in the Protection of Information Web-Portals in Telecommunications Networks

12. Dynamic Data Protection for Mobile Agents: XACML/ABAC Policies

14. You’ve Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations

15. Cybersicherheit in Innen- und Außenpolitik

16. Friedensgutachten 2022

17. Japan’s Peacekeeping at a Crossroads

18. Victims of Political Violence and Terrorism

19. A Model of Information Security Policy Compliance for Public Universities: A Conceptual Model

20. Trenchcoat: Human-Computable Hashing Algorithms for Password Generation

21. Command Dependencies in Heuristic Safety Analysis of Access Control Models

22. Automated Security Analysis of IoT Software Updates

25. Modelling and Simulation of Large and Complex Systems for Airport Baggage Handling Security

26. Enforcing Access Controls in IoT Networks

32. Strategische Partnerschaften in der Außenpolitik

33. Friedensgutachten 2021

34. Access Control for Cross-Border Transfer of Sensor Data

35. Conclusions

38. Ensuring Database Security with the Universal Basis of Relations

39. Regulating IoT Messages

40. Research on Cloud Storage and Security Strategy of Digital Archives

41. Stratification Based Model for Security Policy with Exceptions and Contraries to Duty

42. A Security Model for IoT Networks

43. Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot

45. Firewalls

Catalog

Books, media, physical & digital resources