Books on the topic 'Security and efficiency of information system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security and efficiency of information system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Examining challenges and wasted taxpayer dollars in modernizing border security IT systems: Hearing before the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, February 6, 2014. Washington: U.S. Government Printing Office, 2014.
Find full textDhillon, Gurpreet. Managing Information System Security. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14454-9.
Full textInternational Institute for Educational Planning., ed. An efficiency-based management information system. Paris: Unesco, International Institute for Educational Planning, 1993.
Find full textAtkins, Cathy. Protecting water system security information. Denver, Colo: National Conference of State Legislatures, 2003.
Find full textNHS Management Executive. Information Management Group. Information system security and you. London: Department of Health, 1992.
Find full textOffice, General Accounting. Information security: Advances and remaining challenges to adoption of public key infrastructure technology : report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2001.
Find full textChopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.
Full textSwanson, Marianne. Security self-assessment guide for information technology system. Gaithersburg, MD: U.S. Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, 2001.
Find full textDivision, Montana Legislature Legislative Audit. Information processing facility and central applications: Information system audit. Helena, Mont: Legislative Audit Division, State of Montana, 1999.
Find full textSecurity for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.
Find full textMontana. Legislature. Legislative Audit Division. Datacenter security, Montana Department of Transportation: Information system audit. [Helena, Mont: Legislative Audit Division, 2005.
Find full textMontana. Legislature. Legislative Audit Division. Montana Lottery security, Department of Administration: Information system audit. Helena, MT: The Division, 2003.
Find full textSystems, United Nations Advisory Committee for the Co-ordination of Information. Information system security guidelines for the United Nations organizations. New York: United Nations, 1992.
Find full textMontana. Legislature. Legislative Audit Division. Montana Lottery security, Department of Commerce: Information system audit. Helena, MT: The Division, 1999.
Find full textStevenson, James V. An Enterprise Information System for the Naval Security Group. Monterey, Calif: Naval Postgraduate School, 1998.
Find full textHow to improve the efficiency, safety, and security of maritime transportation: Better use and integration of maritime domain awareness data : hearing before the Subcommittee on Coast Guard and Maritime Transportation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Thirteenth Congress, first session, July 31, 2013. Washington: U.S. Government Printing Office, 2014.
Find full textLüthi, Martin. Information system security in health information systems: Exploratory research in US and Swiss acute-care hospitals. Lohmar: Eul, 2008.
Find full textInstitute, Pennsylvania Bar. Legal issues in information system security: Privacy protection & piracy prevention. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2000.
Find full textMontana. Legislature. Legislative Audit Division. Statewide Accounting, Budgeting and Human Resource System (SABHRS): Information system audit. Helena, MT: Legislative Audit Division, 2002.
Find full textNational security and the D-notice system. Aldershot, Hampshire, England: Ashgate/Dartmouth, 2001.
Find full textPresident's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.
Find full text), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textOrganizational, legal, and technological dimensions of information system administration. Hershey, PA: Information Science Reference, 2014.
Find full textUnited States. Public Interest Declassification Board. Transforming the security classification system: Report to the President. Washington, D.C: Public Interest Declassification Board, 2012.
Find full textPearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.
Find full textPitt, Leyland F. The World Wide Web: What marketing managers might want to know about conversion and efficiency. Henley-on-Thames: Henley Management College, 1996.
Find full textLessons learned from the Government Information Security Reform Act of 2000: Hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, March 6, 2002. Washington: U.S. G.P.O., 2002.
Find full textGlobal Maritime Information Sharing Symposium (2nd 2009 National Defense University). Streamlining information sharing: Improving efficiency, security, safety and the environment : Global Maritime Information Sharing Symposium 2009, September 15-17, National Defense University; Fort Lesley J. McNair, Washington, D.C. [Washington, DC: Office of Global Maritime Situational Awareness], 2009.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. Cyberterrorism: Is the nation's critical infrastructure adequately protected? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, July 24, 2002. Washington: U.S. G.P.O., 2003.
Find full textMcMahon, Walter W. Framework for collecting and analyzing data on the provision of public education: An efficiency-based management information system. [Urbana, Ill.]: College of Commerce and Business Administration, University of Illinois at Urbana-Champaign, 1988.
Find full textP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.
Find full textDivision, Montana Legislature Legislative Audit. EDP audit report, information processing facility and central applications. Helena, Mont: The Division, 1995.
Find full textMontana. Legislature. Legislative Audit Division. EDP audit report, information processing facility and central applications. Helena, MT: The Division, 1996.
Find full textSam, Joel. Ghana Agricultural Information Network System (GAINS): Provision of information in support of agricultural research and development for food security in Ghana. Ghana: Council for Scientific and Industrial Research, 2010.
Find full textOffice, General Accounting. Information technology: Homeland Security needs to improve entry exit system expenditure planning : report to congressional committees. [Washington, D.C.]: The Office, 2003.
Find full textMontana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textDavid, Hutchison. Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textNo computer system left behind: A review of the 2005 federal computer security scorecards : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, March 16, 2006. Washington: U.S. G.P.O., 2006.
Find full textDivision, Montana Legislature Legislative Audit. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textUnited States. Congress. House. Committee on Government Reform. No computer system left behind: A review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005. Washington: U.S. G.P.O., 2005.
Find full textOffice, General Accounting. Information security: Additional actions needed to fully implement reform legislation : report to the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2002.
Find full textGovernment Secrecy Act of 1997: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 712, to provide for a system to classify information in the interests of national security and a system to declassify such information. Washington: U.S. G.P.O., 1998.
Find full textLópez, Javier. Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textIngels, Frank M. Space lab system analysis: Advanced Solid Rocket Motor (ASRM) communications networks analysis : final report. Mississippi State, MS: Dept. of Electrical and Computer Engineering, Mississippi State University, 1990.
Find full textMontana. Legislature. Office of the Legislative Auditor. EDP audit report, information processing facility and central applications. Helena, Mont: The Office, 1994.
Find full textAuditor, Montana Legislature Office of the Legislative. EDP audit report, information processing facility and central applications. Helena, Mont: The Office, 1993.
Find full textMontana. Legislature. Office of the Legislative Auditor. EDP audit report, information processing facility and central applications. Helena, Mont: The Office, 1992.
Find full text