1,813 results on '"SECURITY POLICY"'
Search Results
2. A SLAHP in the Face of DLL Search Order Hijacking
3. New ASMS Architecture in the Mobile Agent System to Protect the Code and Data of an Agent
4. Comprehensive Governance of Security
5. Towards Designing Energy-Aware Cybersecurity Policies
6. Information Security Framework Adoption for South African Small and Medium Enterprise
7. Semantics for Security Policy Enforcement on Android Applications with Practical Cases
8. Secure Deployment of IOT Devices
9. Friedensgutachten 2023
10. Identity Authentication Protocols for Greenhouse Environmental Monitoring System Based on Internet of Things
11. Research of Ways to Increase the Efficiency of Functioning Between Firewalls in the Protection of Information Web-Portals in Telecommunications Networks
12. Dynamic Data Protection for Mobile Agents: XACML/ABAC Policies
13. Research on Security Strategy Based on Public Security Big Data Security Service System
14. You’ve Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations
15. Cybersicherheit in Innen- und Außenpolitik
16. Friedensgutachten 2022
17. Japan’s Peacekeeping at a Crossroads
18. Victims of Political Violence and Terrorism
19. A Model of Information Security Policy Compliance for Public Universities: A Conceptual Model
20. Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
21. Command Dependencies in Heuristic Safety Analysis of Access Control Models
22. Automated Security Analysis of IoT Software Updates
23. Anticipation and Wicked Problems in Public Policy
24. Survey on Access Control Models Feasible in Cyber-Physical Systems
25. Modelling and Simulation of Large and Complex Systems for Airport Baggage Handling Security
26. Enforcing Access Controls in IoT Networks
27. The Common Foreign and Security Policy and the Ukrainian Crisis
28. E-IIPS: A Centralized Policy Implementation Architecture
29. The Executive Strikes Back? The Rise and Fall of Britain’s Parliamentary War Powers
30. British War Powers in Context and Conclusion
31. Alliance Persistence, Military Security and the 2016 Brexit Referendum: The Case of Estonia and the United Kingdom
32. Strategische Partnerschaften in der Außenpolitik
33. Friedensgutachten 2021
34. Access Control for Cross-Border Transfer of Sensor Data
35. Conclusions
36. Discussion
37. Re-Assessing Finland’s Integration Policy: The End of Domestic Consensus?
38. Ensuring Database Security with the Universal Basis of Relations
39. Regulating IoT Messages
40. Research on Cloud Storage and Security Strategy of Digital Archives
41. Stratification Based Model for Security Policy with Exceptions and Contraries to Duty
42. A Security Model for IoT Networks
43. Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot
44. Compliance Verification Algorithm for Computer Systems Security Policies
45. Firewalls
46. Security Assessment, Analysis, and Assurance
47. Introduction to Computer Network Vulnerabilities
48. The Politics of Intolerance, Lived Religion, and Theological Reflection Around Belfast’s Separation Barriers
49. From Window-dressing to Windows of Opportunity: Civil Society Actors in the EU Security Regime—The Case of DG HOME
50. In Search of Strategy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.