Academic literature on the topic 'Information security practice tests'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security practice tests.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security practice tests"
Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textSamios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (February 10, 2021): 933–40. http://dx.doi.org/10.1785/0220200151.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (November 14, 2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textIkhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (October 7, 2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Full textYang, Wei, and Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance." Security and Communication Networks 2021 (March 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.
Full textKubiak, Ireneusz, and Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays." Applied Sciences 12, no. 10 (May 23, 2022): 5281. http://dx.doi.org/10.3390/app12105281.
Full textRicciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, Giuseppe Cesarelli, Francesco De Nola, Roberto Ruggiero, Ludovico Docimo, and Giovanni Improta. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle." Healthcare 10, no. 1 (January 8, 2022): 124. http://dx.doi.org/10.3390/healthcare10010124.
Full textMundt, Christopher C. "Pyramiding for Resistance Durability: Theory and Practice." Phytopathology® 108, no. 7 (July 2018): 792–802. http://dx.doi.org/10.1094/phyto-12-17-0426-rvw.
Full textAkashi, Nozomi, Kohei Nakajima, Mitsuru Shibayama, and Yasuo Kuniyoshi. "A mechanical true random number generator." New Journal of Physics 24, no. 1 (January 1, 2022): 013019. http://dx.doi.org/10.1088/1367-2630/ac45ca.
Full textMeira, Jessica Vieira de Souza, Murat Hancer, Sara Joana Gadotti dos Anjos, and Anita Eves. "Human resources practices and employee motivation in the hospitality industry: A cross-cultural research." Tourism and hospitality management 29, no. 2 (2023): 157–67. http://dx.doi.org/10.20867/thm.29.2.1.
Full textDissertations / Theses on the topic "Information security practice tests"
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textWilliams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Full textHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Full textMahncke, Rachel J. "Measuring and applying information security governance within general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.
Full textMirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker." Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.
Full textVega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.
Full textPh. D.
Shear, Christopher James. "Business counterintelligence : sustainable practice or passing fad?" Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/1930.
Full textTraditional information protection mechanisms are no longer adequately placed to effectively deal with the adversarial threats that have arisen as a result of the rise in importance of knowledge for today’s organisations. Business counterintelligence appears to be a protective entity, which in principle can effectively engage with and mitigate many of these newly manifested threats. Yet, business counterintelligence is also an entity that is accompanied by a great deal of haze and confusion as to its use, implementation and integration within different organisations. This is evident from the literature where there currently exist multiple fragmented definitions of what business counterintelligence is. Organisations may as a result adopt a particular business counterintelligence definition that may not be effective for their context. This can result in the ineffective protection of critical information assets and the misappropriation of organisational resources; something which is not sustainable. This thesis proposes that in order to allay the confusion caused by these differing fragmented definitions, one needs to be able to arrive at a consolidated definition of what constitutes business counterintelligence; this thesis’s primary objective. This has been examined by firstly contextualising business counterintelligence in order to better understand the topic; the information society was used as a backdrop for this purpose. Secondly, an examination of the prevailing views of business counterintelligence and its role within organisations is offered in order to build clarity. Thirdly, a consolidated definition of business counterintelligence is proposed and its implications for different organisations examined. Finally, the implications of this consolidated definition for the sustainability of business counterintelligence are discussed and conclusions based on the evidence presented within the thesis drawn. Based on the arguments presented, this thesis postulates that a consolidated definition of business counterintelligence is more effective and is thus more sustainable.
Sestorp, Isak, and André Lehto. "CPDLC in Practice : A Dissection of the Controller Pilot Data Link Communication Security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159840.
Full textSarmonpal, Sandra. "Learning Analytics from Research to Practice| A Content Analysis to Assess Information Quality on Product Websites." Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421041.
Full textThe purpose of this study was to examine and describe the nature of the research to practice gap in learning analytics applications in K12 educational settings. It was also the purpose of this study to characterize how learning analytics are currently implemented and understood. A secondary objective of this research was to advance a preliminary learning analytics implementation framework for practitioners. To achieve these purposes, this study applied quantitative content analysis using automated text analysis techniques to assess the quality of information provided on analytics-based product websites against learning analytics research. Because learning analytics implementations require adoption of analytical tools, characterizing content on analytics-based product websites provides insight into data practices in K12 schools and how learning analytics are practiced and understood. A major finding of this study was that learning analytics do not appear to be applied in ways that will improve learning outcomes for students as described by the research. A second finding was that policy influence expressed in the study corpus suggest competing interests within the current policy structure for K12 education settings. Keywords: quantitative content analysis, automated text analysis, learning analytics, big data, frameworks, educational technology, website content analysis
Nguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Full textThe current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
Books on the topic "Information security practice tests"
Christy, S. Russell, and Chuck Easttom. CompTIA® Security+® Practice Tests. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549413.
Full textDeng, Robert, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, and Ding Wang, eds. Information Security Practice and Experience. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93206-0.
Full textAkram, Raja Naeem, and Sushil Jajodia, eds. Information Security Theory and Practice. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24018-3.
Full textBao, Feng, Hui Li, and Guilin Wang, eds. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00843-6.
Full textLaurent, Maryline, and Thanassis Giannetsos, eds. Information Security Theory and Practice. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41702-4.
Full textChen, Liqun, Yi Mu, and Willy Susilo, eds. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79104-1.
Full textKwak, Jin, Robert H. Deng, Yoojae Won, and Guilin Wang, eds. Information Security, Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1.
Full textDeng, Robert H., and Tao Feng, eds. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4.
Full textHeng, Swee-Huay, and Javier Lopez, eds. Information Security Practice and Experience. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2.
Full textRyan, Mark D., Ben Smyth, and Guilin Wang, eds. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2.
Full textBook chapters on the topic "Information security practice tests"
Li, Xiehua, Shutang Yang, Jianhua Li, and Hongwen Zhu. "Security Protocol Analysis with Improved Authentication Tests." In Information Security Practice and Experience, 123–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_12.
Full textPark, Heejin, Sang Kil Park, Ki-Ryong Kwon, and Dong Kyue Kim. "Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications." In Information Security Practice and Experience, 74–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31979-5_7.
Full textZhou, Xuhua, Xuhua Ding, and Kefei Chen. "Lightweight Delegated Subset Test with Privacy Protection." In Information Security Practice and Experience, 138–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21031-0_11.
Full textCai, Jun, Jian-Zhen Luo, Jianliang Ruan, and Yan Liu. "Toward Fuzz Test Based on Protocol Reverse Engineering." In Information Security Practice and Experience, 892–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_56.
Full textZhao, Hui, Yongbin Zhou, François-Xavier Standaert, and Hailong Zhang. "Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers." In Information Security Practice and Experience, 336–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_24.
Full textAzad, Nasreen. "DevOps Challenges and Risk Mitigation Strategies by DevOps Professionals Teams." In Lecture Notes in Business Information Processing, 369–85. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_26.
Full textFan, Limin, Hua Chen, and Si Gao. "A General Method to Evaluate the Correlation of Randomness Tests." In Information Security Applications, 52–62. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_4.
Full textde Carvalho, Luciano Gonçalves, and Marcelo Medeiros Eler. "Security Requirements and Tests for Smart Toys." In Enterprise Information Systems, 291–312. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93375-7_14.
Full textKaksonen, Rauli, Kimmo Halunen, Marko Laakso, and Juha Röning. "Transparent Security Method for Automating IoT Security Assessments." In Information Security Practice and Experience, 138–53. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-7032-2_9.
Full textMittelbach, Arno, and Marc Fischlin. "Iterated Hash Functions in Practice." In Information Security and Cryptography, 585–618. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63287-8_15.
Full textConference papers on the topic "Information security practice tests"
Linenberg, Amos. "Continuous on Site Monitoring of VOCs in Water Sources." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4677.
Full textPoon, Anthony, Sarah Giroux, Parfait Eloundou-Enyegue, François Guimbretière, and Nicola Dell. "Baccalauréat Practice Tests in Cameroon." In ICTD2020: Information and Communication Technologies and Development. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3392561.3394646.
Full textMouelhi, Tejeddine, Yves Le Traon, and Benoit Baudry. "Mutation Analysis for Security Tests Qualification." In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taic.part.2007.21.
Full textMouelhi, Tejeddine, Yves Le Traon, and Benoit Baudry. "Mutation Analysis for Security Tests Qualification." In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taicpart.2007.4344128.
Full textKozhurkina, Olesia Alekseevna. "Information security in legal activities." In International Research-to-practice conference, chair Ilia Pavlovich Mikhnev. TSNS Interaktiv Plus, 2018. http://dx.doi.org/10.21661/r-467735.
Full textBlock, Shannon, Steven Munkeby, and Samuel Sambasivam. "An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness." In InSITE 2021: Informing Science + IT Education Conferences. Informing Science Institute, 2021. http://dx.doi.org/10.28945/4763.
Full textGonçalves de Carvalho, Luciano, and Marcelo Medeiros Eler. "Security Tests for Smart Toys." In 20th International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006776101110120.
Full textVaduva, Janalexandru, Raduemanuel Chiscariu, Ioana Culic, Iuliamaria Florea, and Razvan Rughinis. "ADREM: SYSTEM CALL BASED INTRUSION DETECTION FRAMEWORK." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-021.
Full textSimms, David John. "Information Security Optimization: From Theory to Practice." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.106.
Full textMitkovskiy, Alexey, Andrey Ponomarev, and Andrey Proletarskiy. "SIEM-PLATFORM FOR RESEARCH AND EDUCATIONAL TASKS ON PROCESSING OF SECURITY INFORMATION EVENTS." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-143.
Full textReports on the topic "Information security practice tests"
Pilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk, and Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, April 2021. http://dx.doi.org/10.31812/123456789/4374.
Full textGoodwin, Sarah, Yigal Attali, Geoffrey LaFlair, Yena Park, Andrew Runge, Alina von Davier, and Kevin Yancey. Duolingo English Test - Writing Construct. Duolingo, March 2023. http://dx.doi.org/10.46999/arxn5612.
Full textCarle, Steven, Mavrik Zavarin, and Andrew Tompson. Review of Cavity Radius and Chimney Height Information for Underground Nuclear Tests at Nevada National Security Site. Office of Scientific and Technical Information (OSTI), January 2021. http://dx.doi.org/10.2172/1762870.
Full textRuiz-Vega, Mauricio, Ana Corbacho, and Martín Ardanaz. Mind the Gap: Bridging the Perception and Reality of Crime Rates with Information. Inter-American Development Bank, August 2014. http://dx.doi.org/10.18235/0011650.
Full textSergeev, Alexander, Nikolay Litusov, Ekaterina Voroshilina, Alexey Kozlov, Yulia Grigoryeva, Danila Zornikov, Vasily Petrov, et al. Electronic educational resource Microbiology, virology and immunology. SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0769.29012024.
Full textDinovitzer, Aaron. PR-214-134502-R01 Weld Hydrogen Cracking Risk Management Guide. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), May 2019. http://dx.doi.org/10.55274/r0011591.
Full textMacedo, Jorge, Paul Mayne, Sheng Dai, Paola Torres, Cody Arnold, Luis Vergaray, and Yumeng Zhao. Cone Penetration Testing for Illinois Subsurface Characterization and Geotechnical Design. Illinois Center for Transportation, May 2024. http://dx.doi.org/10.36501/0197-9191/24-013.
Full textVilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, March 2013. http://dx.doi.org/10.18235/0011448.
Full textZevotek, Robin, and Steve Kerber. Fire Service Summary Report: Study of the Effectiveness of Fire Service Positive Pressure Ventilation During Fire Attack in Single Family Homes Incorporating Modern Construction Practices. UL Firefighter Safety Research Institute, May 2016. http://dx.doi.org/10.54206/102376/ncck4947.
Full textZevotek, Robin, and Steve Kerber. Study of the Effectiveness of Fire Service Positive Pressure Ventilation During Fire Attack in Single Family Homes Incorporating Modern Construction Practices. UL Firefighter Safety Research Institute, May 2016. http://dx.doi.org/10.54206/102376/gsph6169.
Full text