Letteratura scientifica selezionata sul tema "Information security"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Information security".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Information security"

1

Shumilina, Vera, e Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY". Science & World 2022, n. 3 (30 agosto 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Testo completo
Abstract (sommario):
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES". European International Journal of Multidisciplinary Research and Management Studies 02, n. 10 (11 ottobre 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Testo completo
Abstract (sommario):
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Humaidi, Norshima, e Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness". International Journal of Information and Education Technology 5, n. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Erceg, Aleksandar. "Information security". Tehnički glasnik 13, n. 2 (17 giugno 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Testo completo
Abstract (sommario):
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. Results have shown that the overall behaviour of respondents in production company is more responsible and security awareness with proper use of passwords is associated with knowledge about the importance of security application in their work. Further research is recommended.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kaushik, Saurav. "Information Security". International Journal for Research in Applied Science and Engineering Technology 8, n. 5 (31 maggio 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Yamamoto, Akitomo. "Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Information security"

1

Tyukala, Mkhululi. "Governing information security using organisational information security profiles". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Testo completo
Abstract (sommario):
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Åhlfeldt, Rose-Mharie. "Information Security in Home Healthcare". Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Testo completo
Abstract (sommario):
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management. The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations. The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Yucel, Okan. "Information System Security". Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Testo completo
Abstract (sommario):
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the generated results were evaluated.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Saltysh, S. "Information security: passwords". Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.

Testo completo
Abstract (sommario):
Many people have accounts in different sites, and the problem is that hundreds of millions of passwords are being compromised by cybercriminals every year. People finally need to understand that the Internet is a very hostile place, while online service providers need to finally start taking network security seriously. One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management". Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Testo completo
Abstract (sommario):

The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.

Gli stili APA, Harvard, Vancouver, ISO e altri
6

Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.

Testo completo
Abstract (sommario):
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Lund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.

Testo completo
Abstract (sommario):
In the era of information, it has become vital for companies to make sure that their information is properly protected. They are therefore, willing to spend large amounts of resources on protecting their information. This can usually be done in a large variety of ways. The root of information security is first and foremost, having policies that regulate how information security is upheld. And secondly, by teaching employees proper practice of information security. These are however procedures that are not all that common in a university environment, and even more so in relation to students.   In order to explore this phenomenon further, an exploratory study have been carried out to find more information on the subject. This has been done in several ways in order to grasp as much information as possible. Firstly, by doing a literary study to find out what is already known within the field of information security in regard to students. Secondly, by doing a quantitative study that evaluates the student’s information security awareness. And lastly, by conducting an interview with a member of staff at a university to find out their attitude towards the phenomenon.    The thesis concludes by suggesting how universities might want to handle information security in relationship to students.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Rastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Testo completo
Abstract (sommario):
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Björck, Fredrik. "Discovering information security management /". Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Talib, Shuhaili. "Personalising information security education". Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.

Testo completo
Abstract (sommario):
Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal role. Even with the best of protection, an ill-informed person can effectively remove any protection the control might provide. Information security awareness is therefore imperative to ensure a population is well educated with respect to the threats that exist to one’s electronic information, and how to better protect oneself. Current information security awareness strategies are arguably lacking in their ability to provide a robust and personalised approach to educating users, opting for a blanket, one-size-fits-all solution. This research focuses upon achieving a better understanding of the information security awareness domain; appreciating the requirements such a system would need; and importantly, drawing upon established learning paradigms in seeking to design an effective personalised information security education. A survey was undertaken to better understand how people currently learn about information security. It focussed primarily upon employees of organisations, but also examined the relationship between work and home environments and security practice. The survey also focussed upon understanding how people learn and their preferences for styles of learning. The results established that some good work was being undertaken by organisations in terms of security awareness, and that respondents benefited from such training – both in their workplace and also at home – with a positive relationship between learning at the workplace and practise at home. The survey highlighted one key aspect for both the training provided and the respondents’ preference for learning styles. It varies. It is also clear, that it was difficult to establish the effectiveness of such training and the impact upon practice. The research, after establishing experimentally that personalised learning was a viable approach, proceeded to develop a model for information security awareness that utilised the already successful field of pedagogy and individualised learning. The resulting novel framework “Personalising Information Security Education (PISE)” is proposed. The framework is a holistic approach to solving the problem of information security awareness that can be applied both in the workplace environment and as a tool for the general public. It does not focus upon what is taught, but rather, puts into place the processes to enable an individual to develop their own information security personalised learning plan and to measure their progress through the learning experience.
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Information security"

1

Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo e Rolly Intan, a cura di. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Longley, Dennis, Michael Shain e William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Mambo, Masahiro, e Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Stamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Chow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui e Siu Ming Yiu, a cura di. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Chan, Agnes Hui, e Virgil Gligor, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Gollmann, Dieter, e Felix C. Freiling, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Susilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li e Rolly Intan, a cura di. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Chen, Liqun, Mark Manulis e Steve Schneider, a cura di. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Zhou, Jianying, Javier Lopez, Robert H. Deng e Feng Bao, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Information security"

1

von Solms, S. H., e R. von Solms. "Information Security and Information Security Governance". In Information Security Governance, 1–11. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Fernando, Anjana, e Lakmal Warusawithana. "Information Security". In Beginning Ballerina Programming, 227–68. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Stanley, Richard. "Information Security". In Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Weik, Martin H. "information security". In Computer Science and Communications Dictionary, 778. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Fox, Richard. "Information Security". In Information Technology, 329–66. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Edward, Y. Uechi. "Information Security". In Public Service Information Technology, 155–82. Boca Raton : Taylor & Francis, 2020.: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Reveron, Derek S., e Kathleen A. Mahoney-Norris. "Information Security". In Human and National Security, 181–201. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Weik, Martin H. "security information". In Computer Science and Communications Dictionary, 1535. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Sheppey, Terence, e Ross McGill. "Information Security". In Sarbanes-Oxley, 277–96. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Neel, Andrew J. "Information Security". In Encyclopedia of Sciences and Religions, 1055–58. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_1220.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Information security"

1

Prathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha e U. M. Gopal Krishna. "Digital security for securing private information". In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Neogy, Sarmistha. "Information security". In IML 2017: International Conference on Internet of Things and Machine Learning. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

"Information Security". In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

"Information security". In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Carroll, Michael D. "Information security". In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Селейдарян, Элина Михайловна, e Матвей Артёмович Лысенко. "INFORMATION SECURITY". In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.

Testo completo
Abstract (sommario):
В работе рассмотрены главные компоненты информации, ее влияние и значимость в современном мире. Автором анализируются предпринимаемые меры руководства страны по предотвращению войны в информационном пространстве. The paper considers the main components of information, its influence and significance in the modern world. The author analyses the measures taken by the country's leadership to prevent war in the information space.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Alkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli e Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques". In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Wu, Yue, e Katalin Takacs-Gyorgy. "Information security of food security". In 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Amankwa, Eric, Marianne Loock e Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions". In 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Colbaugh, Richard, Kristin Glass e Travis Bauer. "Dynamic information-theoretic measures for security informatics". In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Information security"

1

Bowen, P., J. Hash e M. Wilson. Information security handbook :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Tsang, Wai, Karen Burkardsmaier e Ed Scheidt. Information-Centric Security. Fort Belvoir, VA: Defense Technical Information Center, febbraio 2004. http://dx.doi.org/10.21236/ada421985.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer e Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, agosto 2002. http://dx.doi.org/10.21236/ada407864.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

LOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Fort Belvoir, VA: Defense Technical Information Center, settembre 2001. http://dx.doi.org/10.21236/ada386363.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kissel, Richard. Small business information security :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Lane, Brendan F., e Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2002. http://dx.doi.org/10.21236/ada418505.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Quist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), aprile 1993. http://dx.doi.org/10.2172/6934153.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Moser, William S. The Economics of Information Security. Fort Belvoir, VA: Defense Technical Information Center, aprile 2002. http://dx.doi.org/10.21236/ada404567.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Fort Belvoir, VA: Defense Technical Information Center, agosto 2001. http://dx.doi.org/10.21236/ada405011.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Rosenthal, David, Peter Samsel e Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, novembre 2002. http://dx.doi.org/10.21236/ada408503.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia