Books on the topic 'Information systems security policy'

To see the other types of publications on this topic, follow the link: Information systems security policy.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Information systems security policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

NHS Management Executive. Information Management Group. Information systems security: Top level policy for the NHS. [Leeds]: NHS Management Executive, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Homeland security preparedness and information systems: Strategies for managing public policy. Hershey, PA: Information Science Reference, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Workshop, on Integrity Policy in Computer Information Systems (1987 Waltham Mass ). Report of the invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS). Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

NATO, Advanced Research Workshop on Future NATO Security (2003 Prague Czech Republic). Future NATO security: Addressing the challenges of evolving security and information sharing systems and architectures. Burke, VA: IOS Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Md.) National Information Systems Security Conference (20th 1997 Baltimore. 20th National Information Systems Security Conference: Final attendance list, October 7-10, 1997, Baltimore Convention Center, Baltimore, MD. Gaithersburg, MD: U.S. Department of Commerce, National Institute of Standards and Technology, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Police information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Commerce, Canada Task Force on Electronic. A cryptography policy framework for electronic commerce: Building Canada's information economy and society. [Ottawa]: Task Force on Electronic Commerce, Industry Canada, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brock, Jack L. Critical infrastructure protection: Comments on the national plan for information systems protection : statement for the record by Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate. [Washington, D.C.]: The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meeting the need for inter-operability and information security in health IT: Hearing before the Committee on Science and Technology, House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1945-, Kramer Franklin D., Starr Stuart H, and Wentz Larry K, eds. Cyberpower and national security. Washington, D.C: Potomac Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Flynn, Nancy. The e-Policy Handbook. New York: AMACOM Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

The Cyber Initiative: Hearing before the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, February 28, 2008. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

No computer system left behind: A review of the 2005 federal computer security scorecards : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, March 16, 2006. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

United States. Congress. House. Committee on Government Reform. No computer system left behind: A review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Telecommunications and SCADA: Secure links or open portals to the security of our nation's critical infrastructure? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 30, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Brock, Jack L. Critical infrastructure protection: Fundamental improvements needed to assure security of federal operations : statement of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary, U.S. Senate. Washington, D.C: The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Energy Policy, Health Care, and Entitlements. Evaluating privacy, security, and fraud concerns with Obamacare's information sharing apparatus: Joint hearing before the Subcommittee on Energy Policy, Health Care, and Entitlements of the Committee on Oversight and Government Reform and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 17, 2013. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

W, Dam Kenneth, Lin Herbert, and National Research Council (U.S.). Committee to Study National Cryptography Policy., eds. Cryptography's role in securing the information society: Kenneth W. Dam and Herbert S. Lin, editors. Washington, DC: National Academy Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Reviewing the federal cybersecurity mission: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, March 10, 2009. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bakolia, George. Assessment of agency compliance with enterprise security standards: As directed by session law 2003-153, section 1(a), general statute 147-33.82(el), 2003 session of the North Carolina General Assembly. United States]: Gartner, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

The future of cyber and telecommunications security at DHS: Hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 13, 2006. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Securing cyberspace: Efforts to protect national information infrastructures continue to face challenges : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, July 19, 2005. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

The Homeland Security Information Network: An update on DHS information-sharing efforts : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, U.S. House of Representatives, One Hundred Ninth Congress, second session, September 13, 2006. Washington: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

United States. Congress. House. Committee on Homeland Security. Cybersecurity: DHS's role, federal efforts, and national policy : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, second session, June 16, 2010. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Improving management and acquisition of information technology systems in the Department of Defense: Hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held April 6, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

New technologies and innovations in the mobile and online space, and the implications for public policy: Hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, June 19, 2012. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

United States. Department of Defense. Chief Information Officer. 2006 Department of Defense Chief Information Officer strategic plan. Washington, D.C: DoD Chief Information Officer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Desgens-Pasanau, Guillaume. Protection des données à caractère personnel. Paris: LexisNexis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

United States. Government Accountability Office. Cybersecurity, cyberanalysis, and warning. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

United States. Government Accountability Office. Terrorist watch list screening: Efforts to help reduce adverse effects on the public : report to congressional requesters. Washington, D.C: U.S. Govt. Accountability Office, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

United States. Government Accountability Office. Homeland Security: Departmentwide integrated financial management systems remain a challenge : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Tripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ganapathy, Vinod, Trent Jaeger, and R. K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Prakash, Atul, and Rudrapatna Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Garg, Deepak, N. V. Narendra Kumar, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Venkatakrishnan, Venkat, and Diganta Goswami, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ray, Indrajit, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, and V. Kamakoti, eds. Information Systems Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Shyamasundar, Rudrapatna K., Virendra Singh, and Jaideep Vaidya, eds. Information Systems Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Jajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Prakash, Atul, and Indranil Sen Gupta, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Jha, Somesh, and Anish Mathuria, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17714-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bagchi, Aditya, and Vijayalakshmi Atluri, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bagchi, Aditya, and Indrakshi Ray, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

McDaniel, Patrick, and Shyam K. Gupta, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Katsikas, Sokratis K., and Dimitris Gritzalis, eds. Information Systems Security. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kanhere, Salil, Vishwas T. Patil, Shamik Sural, and Manoj S. Gaur, eds. Information Systems Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65610-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography