Articoli di riviste sul tema "Information security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Information security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Shumilina, Vera, e Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY". Science & World 2022, n. 3 (30 agosto 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Testo completoImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Testo completoNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Testo completoKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Testo completoMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Testo completoAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES". European International Journal of Multidisciplinary Research and Management Studies 02, n. 10 (11 ottobre 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Testo completoHumaidi, Norshima, e Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness". International Journal of Information and Education Technology 5, n. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Testo completoErceg, Aleksandar. "Information security". Tehnički glasnik 13, n. 2 (17 giugno 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Testo completoKaushik, Saurav. "Information Security". International Journal for Research in Applied Science and Engineering Technology 8, n. 5 (31 maggio 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Testo completoYamamoto, Akitomo. "Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Testo completoJesan, John Peter. "Information security". Ubiquity 2006, January (gennaio 2006): 2. http://dx.doi.org/10.1145/1119621.1117695.
Testo completoSilic, Mario, e Andrea Back. "Information security". Information Management & Computer Security 22, n. 3 (8 luglio 2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.
Testo completoLaybats, Claire, e Luke Tredinnick. "Information security". Business Information Review 33, n. 2 (giugno 2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.
Testo completoYang, Xia. "A Novel Information Security Model for Securing Information Systems". Applied Mechanics and Materials 685 (ottobre 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Testo completoSharma, Suman, Yogesh Verma e Amit Nadda. "Information Security Cyber Security Challenges". International Journal of Scientific Research in Computer Science and Engineering 7, n. 1 (28 febbraio 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Testo completoDunkerley, Kimberley, e Gurvirender Tejay. "Theorizing Information Security Success". International Journal of Electronic Government Research 6, n. 3 (luglio 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Testo completoWendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande e Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education". JUCS - Journal of Universal Computer Science 26, n. 7 (28 luglio 2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.
Testo completoSingh, Lisha, Sahil Sharma e Sneh Rathore. "Secure101: Automatic Surveillance and Information Security". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30 aprile 2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.
Testo completoDomozetov, Christo. "Information Security: Management and Personnel Issues". Information & Security: An International Journal 1, n. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.
Testo completoKavaljiev, Todor. "Information in providing security and prosperity". Information & Security: An International Journal 1, n. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.
Testo completoTagarev, Peter. "National Security Concepts and Information Warfare". Information & Security: An International Journal 1, n. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.
Testo completoSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE". American Journal of Applied Science and Technology 3, n. 10 (1 ottobre 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Testo completoLestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology". IJIIS: International Journal of Informatics and Information Systems 7, n. 1 (7 gennaio 2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.
Testo completoMorita, Hikaru, e Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, n. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.
Testo completoBondar, H. L., e L. O. Rakutina. "Information policy and information security". Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.
Testo completoLIDERMAN, Krzysztof, e Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY". National Security Studies 4, n. 1 (1 dicembre 2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.
Testo completoHojda, Mihaela Hortensia. "Information security economics: cyber security threats". Proceedings of the International Conference on Business Excellence 16, n. 1 (1 agosto 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Testo completoKuka, Elda, e Rovena Bahiti. "Information Security Management: Password Security Issues". Academic Journal of Interdisciplinary Studies 7, n. 2 (1 luglio 2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Testo completoJohnston, Allen C., e Ron Hale. "Improved security through information security governance". Communications of the ACM 52, n. 1 (gennaio 2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Testo completovon Solms, Basie, e Rossouw von Solms. "From information security to…business security?" Computers & Security 24, n. 4 (giugno 2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.
Testo completovon Solms, Rossouw, e Johan van Niekerk. "From information security to cyber security". Computers & Security 38 (ottobre 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.
Testo completoMartins, José, Henrique dos Santos, António Rosinha e Agostinho Valente. "Information Security Management". International Journal of Cyber Warfare and Terrorism 3, n. 3 (luglio 2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Testo completoLim, Joo S., Sean B. Maynard, Atif Ahmad e Shanton Chang. "Information Security Culture". International Journal of Cyber Warfare and Terrorism 5, n. 2 (aprile 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Testo completoSomepalli, Sri Harsha, Sai Kishore Reddy Tangella e Santosh Yalamanchili. "Information Security Management". HOLISTICA – Journal of Business and Public Administration 11, n. 2 (1 agosto 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Testo completoLiang, Yingbin, H. Vincent Poor e Shlomo Shamai (Shitz). "Information Theoretic Security". Foundations and Trends® in Communications and Information Theory 5, n. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.
Testo completoBoychenko, O. V., e D. V. Ivanyuta. "INFORMATION SECURITY MODELS". Construction economic and environmental management 80, n. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Testo completoWu, Yu ’Andy’, e Carol Stoak Saunders. "Governing Information Security". Information Resources Management Journal 24, n. 1 (gennaio 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Testo completoKnapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr. e F. Nelson Ford. "Information Security Effectiveness". International Journal of Information Security and Privacy 1, n. 2 (aprile 2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.
Testo completoJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma e Haralambos Mouratidis. "Information Systems Security". International Journal of Information Security and Privacy 1, n. 3 (luglio 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Testo completoЛихачева e G. Likhacheva. "Information technology security". Safety in Technosphere 1, n. 6 (25 dicembre 2012): 70–73. http://dx.doi.org/10.12737/162.
Testo completoDotson, Daniel S. "Information Security Resources". Science & Technology Libraries 27, n. 3 (10 luglio 2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.
Testo completoGifford, E. A. "Electronic information security". IEEE Potentials 7, n. 4 (dicembre 1988): 26–30. http://dx.doi.org/10.1109/45.31568.
Testo completoFried, Louis. "DISTRIBUTED INFORMATION SECURITY". Information Systems Management 10, n. 3 (gennaio 1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.
Testo completoTsujii, Shigeo. "On Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.
Testo completoPoore, Ralph Spencer. "Information Security Governance". EDPACS 33, n. 5 (novembre 2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Testo completoTipton, Harold, e Micki Krause. "Information Security Management". EDPACS 27, n. 12 (giugno 2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.
Testo completoFitzgerald, Kevin J. "Information security baselines". Information Management & Computer Security 3, n. 2 (maggio 1995): 8–12. http://dx.doi.org/10.1108/09685229510088575.
Testo completoWilliams, Paul. "Information Security Governance". Information Security Technical Report 6, n. 3 (settembre 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Testo completoEloff, J. H. P., e M. M. Eloff. "Information security architecture". Computer Fraud & Security 2005, n. 11 (novembre 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.
Testo completoLundgren, Björn, e Niklas Möller. "Defining Information Security". Science and Engineering Ethics 25, n. 2 (15 novembre 2017): 419–41. http://dx.doi.org/10.1007/s11948-017-9992-1.
Testo completo