Gotowa bibliografia na temat „Information security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Information security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Information security"
Shumilina, Vera, i Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY". Science & World 2022, nr 3 (30.08.2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Pełny tekst źródłaImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Pełny tekst źródłaNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Pełny tekst źródłaKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Pełny tekst źródłaMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Pełny tekst źródłaHumaidi, Norshima, i Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness". International Journal of Information and Education Technology 5, nr 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Pełny tekst źródłaAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES". European International Journal of Multidisciplinary Research and Management Studies 02, nr 10 (11.10.2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Pełny tekst źródłaErceg, Aleksandar. "Information security". Tehnički glasnik 13, nr 2 (17.06.2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Pełny tekst źródłaKaushik, Saurav. "Information Security". International Journal for Research in Applied Science and Engineering Technology 8, nr 5 (31.05.2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Pełny tekst źródłaYamamoto, Akitomo. "Information Security". IEEJ Transactions on Electronics, Information and Systems 107, nr 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Pełny tekst źródłaRozprawy doktorskie na temat "Information security"
Tyukala, Mkhululi. "Governing information security using organisational information security profiles". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Pełny tekst źródłaÅhlfeldt, Rose-Mharie. "Information Security in Home Healthcare". Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.
Pełny tekst źródłaYucel, Okan. "Information System Security". Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.
Pełny tekst źródłaSaltysh, S. "Information security: passwords". Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.
Pełny tekst źródłaBurkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management". Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.
Pełny tekst źródłaThe security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.
Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.
Pełny tekst źródłaLund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.
Pełny tekst źródłaRastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Pełny tekst źródłaBjörck, Fredrik. "Discovering information security management /". Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.
Pełny tekst źródłaTalib, Shuhaili. "Personalising information security education". Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.
Pełny tekst źródłaKsiążki na temat "Information security"
Drevin, Lynette, Suné Von Solms i Marianthi Theocharidou, red. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.
Pełny tekst źródłaLiu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo i Rolly Intan, red. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.
Pełny tekst źródłaLongley, Dennis, Michael Shain i William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.
Pełny tekst źródłaMambo, Masahiro, i Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.
Pełny tekst źródłaStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.
Pełny tekst źródłaChow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui i Siu Ming Yiu, red. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.
Pełny tekst źródłaChan, Agnes Hui, i Virgil Gligor, red. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.
Pełny tekst źródłaGollmann, Dieter, i Felix C. Freiling, red. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.
Pełny tekst źródłaSusilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li i Rolly Intan, red. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.
Pełny tekst źródłaChen, Liqun, Mark Manulis i Steve Schneider, red. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.
Pełny tekst źródłaCzęści książek na temat "Information security"
von Solms, S. H., i R. von Solms. "Information Security and Information Security Governance". W Information Security Governance, 1–11. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.
Pełny tekst źródłaFernando, Anjana, i Lakmal Warusawithana. "Information Security". W Beginning Ballerina Programming, 227–68. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.
Pełny tekst źródłaStanley, Richard. "Information Security". W Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.
Pełny tekst źródłaWeik, Martin H. "information security". W Computer Science and Communications Dictionary, 778. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.
Pełny tekst źródłaFox, Richard. "Information Security". W Information Technology, 329–66. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.
Pełny tekst źródłaEdward, Y. Uechi. "Information Security". W Public Service Information Technology, 155–82. Boca Raton : Taylor & Francis, 2020.: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.
Pełny tekst źródłaReveron, Derek S., i Kathleen A. Mahoney-Norris. "Information Security". W Human and National Security, 181–201. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.
Pełny tekst źródłaWeik, Martin H. "security information". W Computer Science and Communications Dictionary, 1535. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.
Pełny tekst źródłaSheppey, Terence, i Ross McGill. "Information Security". W Sarbanes-Oxley, 277–96. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.
Pełny tekst źródłaNeel, Andrew J. "Information Security". W Encyclopedia of Sciences and Religions, 1055–58. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_1220.
Pełny tekst źródłaStreszczenia konferencji na temat "Information security"
Neogy, Sarmistha. "Information security". W IML 2017: International Conference on Internet of Things and Machine Learning. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.
Pełny tekst źródła"Information Security". W 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.
Pełny tekst źródła"Information security". W 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.
Pełny tekst źródłaCarroll, Michael D. "Information security". W the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.
Pełny tekst źródłaСелейдарян, Элина Михайловна, i Матвей Артёмович Лысенко. "INFORMATION SECURITY". W Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.
Pełny tekst źródłaAlkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli i Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques". W 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.
Pełny tekst źródłaWu, Yue, i Katalin Takacs-Gyorgy. "Information security of food security". W 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.
Pełny tekst źródłaAmankwa, Eric, Marianne Loock i Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions". W 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.
Pełny tekst źródłaColbaugh, Richard, Kristin Glass i Travis Bauer. "Dynamic information-theoretic measures for security informatics". W 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.
Pełny tekst źródłaCooper, Michael H. "Information security training". W the ACM SIGUCCS fall conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1629501.1629541.
Pełny tekst źródłaRaporty organizacyjne na temat "Information security"
Bowen, P., J. Hash i M. Wilson. Information security handbook :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.
Pełny tekst źródłaTsang, Wai, Karen Burkardsmaier i Ed Scheidt. Information-Centric Security. Fort Belvoir, VA: Defense Technical Information Center, luty 2004. http://dx.doi.org/10.21236/ada421985.
Pełny tekst źródłaYoung, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer i Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2002. http://dx.doi.org/10.21236/ada407864.
Pełny tekst źródłaLOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Fort Belvoir, VA: Defense Technical Information Center, wrzesień 2001. http://dx.doi.org/10.21236/ada386363.
Pełny tekst źródłaKissel, Richard. Small business information security :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.
Pełny tekst źródłaLane, Brendan F., i Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada418505.
Pełny tekst źródłaQuist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), kwiecień 1993. http://dx.doi.org/10.2172/6934153.
Pełny tekst źródłaMoser, William S. The Economics of Information Security. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2002. http://dx.doi.org/10.21236/ada404567.
Pełny tekst źródłaSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2001. http://dx.doi.org/10.21236/ada405011.
Pełny tekst źródłaRosenthal, David, Peter Samsel i Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, listopad 2002. http://dx.doi.org/10.21236/ada408503.
Pełny tekst źródła