Works matching DE "ELECTRONIC system security measures"
Results: 12
Predicting and Preventing the Theft of Electronic Products.
- Published in:
- European Journal on Criminal Policy & Research, 2008, v. 14, n. 1, p. 11, doi. 10.1007/s10610-007-9039-2
- By:
- Publication type:
- Article
The Need for Effective Dialogue.
- Published in:
- European Journal on Criminal Policy & Research, 2008, v. 14, n. 1, p. 89, doi. 10.1007/s10610-007-9042-7
- By:
- Publication type:
- Article
Design and Crime: Proofing Electronic Products and Services against Theft.
- Published in:
- European Journal on Criminal Policy & Research, 2008, v. 14, n. 1, p. 1, doi. 10.1007/s10610-007-9043-6
- By:
- Publication type:
- Article
What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods.
- Published in:
- European Journal on Criminal Policy & Research, 2008, v. 14, n. 1, p. 61, doi. 10.1007/s10610-007-9041-8
- By:
- Publication type:
- Article
Using Automated Identity and Access Management Controls.
- Published in:
- CPA Journal, 2008, v. 78, n. 9, p. 66
- By:
- Publication type:
- Article
Plant Functional Safety Requires IT Security.
- Published in:
- Chemical Engineering, 2016, v. 123, n. 7, p. 42
- By:
- Publication type:
- Article
Selected Methods For Increases Reliability The Of Electronic Systems Security.
- Published in:
- Journal of Konbin, 2015, v. 35, n. 1, p. 147, doi. 10.1515/jok-2015-0048
- By:
- Publication type:
- Article
Heuristic particle swarm optimization approach for test point selection with imperfect test.
- Published in:
- Journal of Intelligent Manufacturing, 2017, v. 28, n. 1, p. 37, doi. 10.1007/s10845-014-0960-1
- By:
- Publication type:
- Article
Security of e-systems.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 322, doi. 10.1002/sec.897
- By:
- Publication type:
- Article
Electronic Voting System: An Issue of Voter's Privacy against the security of the system.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 858
- By:
- Publication type:
- Article
Balancing Good Intentions: Protecting the Privacy of Electronic Health Information.
- Published in:
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 69, doi. 10.1177/0270467607311485
- By:
- Publication type:
- Article
Safety integrity level verification for safety-related functions with security aspects.
- Published in:
- Process Safety & Environmental Protection: Transactions of the Institution of Chemical Engineers Part B, 2018, v. 118, n. Part B, p. 79, doi. 10.1016/j.psep.2018.06.016
- By:
- Publication type:
- Article