Libri sul tema "Information storage and retrieval systems - security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Information storage and retrieval systems - security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Police, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.
Cerca il testo completo), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Cerca il testo completoComputer Systems Laboratory (U.S.), a cura di. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Cerca il testo completoUnited States. National Aeronautics and Space Administration., a cura di. NASA electronic library system (NELS): The system impact of security. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1993.
Cerca il testo completoGoldston, James K. A guide to understanding data remanence in automated information systems. 2a ed. [Fort George G. Meade, MD]: National Computer Security Center, 1991.
Cerca il testo completoNational Institute of Standards and Technology (U.S.). Security requirements for cryptographic modules. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Cerca il testo completoUnited States. General Accounting Office. Information Management & Technology Division., a cura di. SSA pilot for centralized folder storage. Washington, D.C: The Office, 1992.
Cerca il testo completoUnited States. Department of Transportation. Office of Inspector General. Information security program. Washington, D.C: U.S Dept. of Transportation, Office of the Secretary of Transportation, Office of Inspector General, 2005.
Cerca il testo completoVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Cerca il testo completoWitt-Barthel, Annegret. Chancen sozialorientierter Technikgestaltung: Politische Ansätze und Gestaltbarkeit der Informationstechnik in der sozialen Sicherung. Opladen: Westdeutscher Verlag, 1992.
Cerca il testo completoEloff, Jan H. P. Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30-October 1, 1999, Amsterdam, The Netherlands. Boston, MA: Springer US, 1999.
Cerca il testo completoHerold, Rebecca. Encyclopedia of information assurance. Boca Raton, FL: Auerbach Publications, 2011.
Cerca il testo completoWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 8. Sausalito, Calif: InfoSecurity Infrastructure, 2001.
Cerca il testo completoWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 5. Sausalito, Ca: Baseline Software, 1996.
Cerca il testo completoWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 7. Sausalito, Calif: Baseline Software, 1999.
Cerca il testo completoUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., a cura di. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Cerca il testo completoOffice, General Accounting. Geological survey: Computer security. Washington, D.C: The Office, 1992.
Cerca il testo completoKizza, Joseph Migga. Guide to Computer Network Security. 2a ed. London: Springer London, 2013.
Cerca il testo completoMesa Redonda Regional Americana sobre la Informática en la Seguridad Social (1983 Bogotá, Colombia). Mesa Redonda Regional Americana sobre la Informática en la Seguridad Social, Bogotá, Colombia, 23 al 25 de noviembre de 1983. Buenos Aires: Secretaría General de la Asociación Internacional de la Seguridad Social, Oficina Regional para las Américas, 1985.
Cerca il testo completoThomas, Norman. Integrated security systems design: Concepts, specifications, and implementation. Amsterdam: Elsevier Butterworth-Heinemann, 2007.
Cerca il testo completoCannon, David L. CISA: Certified information systems auditor study guide. 2a ed. Hoboken, NJ: Wiley Technology Pub., 2008.
Cerca il testo completoMezhdunarodnai︠a︡, konferent︠s︡ii︠a︡ "Kompleksnai︠a︡ zashchita informat︠s︡ii" (14th 2009 Mahili︠o︡ŭ Belarus). Kompleksnai︠a︡ zashchita informat︠s︡ii: Materialy XIV Mezhdunarodnoĭ konferent︠s︡ii, 19-22 mai︠a︡ 2009 goda, Mogilev (Respublika Belarusʹ). Minsk: [s. n.], 2009.
Cerca il testo completoCISA: Certified information systems auditor study guide. 3a ed. Indianapolis, Ind: Wiley Pub., 2011.
Cerca il testo completoHerzig, Terrell W. Information security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.
Cerca il testo completoUnited States. Government Accountability Office, a cura di. Federal Reserve Banks: Areas for improvment in information systems controls. Washington, DC: U.S. Govt. Accountability Office, 2011.
Cerca il testo completoThuraisingham, Bhavani. Data and Application Security: Developments and Directions. Boston, MA: Kluwer Academic Publishers, 2002.
Cerca il testo completoCannon, David L. CISA - Certified Information Systems Auditor: Study guide. Indianapolis, Indiana: Wiley Pub., 2006.
Cerca il testo completoGerstein, Daniel M. Securing America's future: National strategy in the information age. Westport, CT: Praeger Security International, 2006.
Cerca il testo completoservice), SpringerLink (Online, a cura di. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Cerca il testo completoAtluri, Vijay. Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA. Boston, MA: Springer US, 2000.
Cerca il testo completoUnited States. Government Accountability Office, a cura di. Federal Reserve Banks: Areas for improvement in information security controls. Washington, DC: U.S. Govt. Accountability Office, 2010.
Cerca il testo completoScott, Ernest D. Police information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.
Cerca il testo completoUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Energy Policy, Health Care, and Entitlements. Evaluating privacy, security, and fraud concerns with Obamacare's information sharing apparatus: Joint hearing before the Subcommittee on Energy Policy, Health Care, and Entitlements of the Committee on Oversight and Government Reform and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 17, 2013. Washington: U.S. Government Printing Office, 2014.
Cerca il testo completoBoche, Holger, H. Vincent Poor, Rafael F. Schaefer e Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.
Cerca il testo completoBoche, Holger, H. Vincent Poor, Rafael F. Schaefer e Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.
Cerca il testo completoBoche, Holger, H. Vincent Poor, Rafael F. Schaefer e Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.
Cerca il testo completoJia, Xiaohua, e Kan Yang. Security for Cloud Storage Systems. Springer London, Limited, 2013.
Cerca il testo completoCunha, Caio Almeida. Data Storage: Systems, Management and Security Issues. Nova Science Publishers, Incorporated, 2017.
Cerca il testo completoWheeler, Aaron, e Michael Winburn. Cloud Storage Security: A Practical Guide. Elsevier, 2015.
Cerca il testo completoCloud Storage Security: A Practical Guide. Elsevier Science & Technology Books, 2015.
Cerca il testo completoManaging Information System Security. MacMillan Education, Limited, 1997.
Cerca il testo completoSaeed, Khalid, e Jerzy Pejas. Information Processing and Security Systems. Springer, 2014.
Cerca il testo completoSaeed, Khalid, e Jerzy Pejas. Information Processing and Security Systems. Springer, 2005.
Cerca il testo completo(Editor), Khalid Saeed, e Jerzy Pejas (Editor), a cura di. Information Processing and Security Systems. Springer, 2005.
Cerca il testo completoGrama, Joanna Lyn, e vLab Solutions Staff. Laboratory Manual to Accompany Legal Issues in Information Security. Jones & Bartlett Learning, LLC, 2011.
Cerca il testo completoInformation Systems Security Lecture Notes in Computer Science Security and Cryptology. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.
Cerca il testo completoSusanto, Heru, e Mohammad Nabil Almunawar. Information Security Management Systems. Taylor & Francis Group, 2021.
Cerca il testo completoSecurity and privacy guidelines for health information systems. [Edmonton]: COACH, 1995.
Cerca il testo completoJavidi, Bahram. Optical and Digital Techniques for Information Security. Springer New York, 2010.
Cerca il testo completoNorman, Thomas L. Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems. Elsevier Science & Technology Books, 2014.
Cerca il testo completo