Books on the topic 'Information storage and retrieval systems - security'

To see the other types of publications on this topic, follow the link: Information storage and retrieval systems - security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Information storage and retrieval systems - security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Police, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. National Aeronautics and Space Administration., ed. NASA electronic library system (NELS): The system impact of security. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Goldston, James K. A guide to understanding data remanence in automated information systems. 2nd ed. [Fort George G. Meade, MD]: National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.). Security requirements for cryptographic modules. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. General Accounting Office. Information Management & Technology Division., ed. SSA pilot for centralized folder storage. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Department of Transportation. Office of Inspector General. Information security program. Washington, D.C: U.S Dept. of Transportation, Office of the Secretary of Transportation, Office of Inspector General, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Victoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Witt-Barthel, Annegret. Chancen sozialorientierter Technikgestaltung: Politische Ansätze und Gestaltbarkeit der Informationstechnik in der sozialen Sicherung. Opladen: Westdeutscher Verlag, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Eloff, Jan H. P. Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30-October 1, 1999, Amsterdam, The Netherlands. Boston, MA: Springer US, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Herold, Rebecca. Encyclopedia of information assurance. Boca Raton, FL: Auerbach Publications, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 8. Sausalito, Calif: InfoSecurity Infrastructure, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 5. Sausalito, Ca: Baseline Software, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 7. Sausalito, Calif: Baseline Software, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

United States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Office, General Accounting. Geological survey: Computer security. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kizza, Joseph Migga. Guide to Computer Network Security. 2nd ed. London: Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mesa Redonda Regional Americana sobre la Informática en la Seguridad Social (1983 Bogotá, Colombia). Mesa Redonda Regional Americana sobre la Informática en la Seguridad Social, Bogotá, Colombia, 23 al 25 de noviembre de 1983. Buenos Aires: Secretaría General de la Asociación Internacional de la Seguridad Social, Oficina Regional para las Américas, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Thomas, Norman. Integrated security systems design: Concepts, specifications, and implementation. Amsterdam: Elsevier Butterworth-Heinemann, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cannon, David L. CISA: Certified information systems auditor study guide. 2nd ed. Hoboken, NJ: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mezhdunarodnai︠a︡, konferent︠s︡ii︠a︡ "Kompleksnai︠a︡ zashchita informat︠s︡ii" (14th 2009 Mahili︠o︡ŭ Belarus). Kompleksnai︠a︡ zashchita informat︠s︡ii: Materialy XIV Mezhdunarodnoĭ konferent︠s︡ii, 19-22 mai︠a︡ 2009 goda, Mogilev (Respublika Belarusʹ). Minsk: [s. n.], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

CISA: Certified information systems auditor study guide. 3rd ed. Indianapolis, Ind: Wiley Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Herzig, Terrell W. Information security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

United States. Government Accountability Office, ed. Federal Reserve Banks: Areas for improvment in information systems controls. Washington, DC: U.S. Govt. Accountability Office, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Thuraisingham, Bhavani. Data and Application Security: Developments and Directions. Boston, MA: Kluwer Academic Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cannon, David L. CISA - Certified Information Systems Auditor: Study guide. Indianapolis, Indiana: Wiley Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gerstein, Daniel M. Securing America's future: National strategy in the information age. Westport, CT: Praeger Security International, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

service), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Atluri, Vijay. Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA. Boston, MA: Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

United States. Government Accountability Office, ed. Federal Reserve Banks: Areas for improvement in information security controls. Washington, DC: U.S. Govt. Accountability Office, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Scott, Ernest D. Police information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Energy Policy, Health Care, and Entitlements. Evaluating privacy, security, and fraud concerns with Obamacare's information sharing apparatus: Joint hearing before the Subcommittee on Energy Policy, Health Care, and Entitlements of the Committee on Oversight and Government Reform and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 17, 2013. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Boche, Holger, H. Vincent Poor, Rafael F. Schaefer, and Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Boche, Holger, H. Vincent Poor, Rafael F. Schaefer, and Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Boche, Holger, H. Vincent Poor, Rafael F. Schaefer, and Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jia, Xiaohua, and Kan Yang. Security for Cloud Storage Systems. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cunha, Caio Almeida. Data Storage: Systems, Management and Security Issues. Nova Science Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wheeler, Aaron, and Michael Winburn. Cloud Storage Security: A Practical Guide. Elsevier, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Cloud Storage Security: A Practical Guide. Elsevier Science & Technology Books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Managing Information System Security. MacMillan Education, Limited, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Saeed, Khalid, and Jerzy Pejas. Information Processing and Security Systems. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Saeed, Khalid, and Jerzy Pejas. Information Processing and Security Systems. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

(Editor), Khalid Saeed, and Jerzy Pejas (Editor), eds. Information Processing and Security Systems. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Grama, Joanna Lyn, and vLab Solutions Staff. Laboratory Manual to Accompany Legal Issues in Information Security. Jones & Bartlett Learning, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Information Systems Security Lecture Notes in Computer Science Security and Cryptology. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Susanto, Heru, and Mohammad Nabil Almunawar. Information Security Management Systems. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Security and privacy guidelines for health information systems. [Edmonton]: COACH, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Javidi, Bahram. Optical and Digital Techniques for Information Security. Springer New York, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Norman, Thomas L. Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography