Data Security最新文献

筛选
英文 中文
Hazards in the Technical Environment 技术环境中的危害
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_5
Thomas H. Lenhard
{"title":"Hazards in the Technical Environment","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_5","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_5","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Common Security Problems 常见的保安问题
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_14
Thomas H. Lenhard
{"title":"Common Security Problems","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_14","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_14","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131986353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Computers and IP Addresses 识别计算机和IP地址
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_15
Thomas H. Lenhard
{"title":"Identification of Computers and IP Addresses","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_15","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_15","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Protection and Data Security 数据保护和数据安全
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_2
Thomas H. Lenhard
{"title":"Data Protection and Data Security","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_2","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_2","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Encryption 加密
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_12
Thomas H. Lenhard
{"title":"Encryption","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_12","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_12","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121533435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dangerous Software 危险的软件
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_6
Thomas H. Lenhard
{"title":"Dangerous Software","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_6","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_6","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131726025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Router 路由器
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_17
Thomas H. Lenhard
{"title":"The Router","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_17","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_17","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126184638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Configuration of Security Systems 保安系统的配置
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_18
Thomas H. Lenhard
{"title":"Configuration of Security Systems","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_18","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_18","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime 数据安全:防止数据丢失和计算机犯罪的技术和组织保护措施
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7
Thomas H. Lenhard
{"title":"Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132428511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organizational Data Security 组织数据安全
Data Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-658-35494-7_20
Thomas H. Lenhard
{"title":"Organizational Data Security","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_20","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_20","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信