Gotowa bibliografia na temat „Information security”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Information security”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Information security"

1

Shumilina, Vera, i Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY". Science & World 2022, nr 3 (30.08.2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Pełny tekst źródła
Streszczenie:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
Style APA, Harvard, Vancouver, ISO itp.
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, nr 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Humaidi, Norshima, i Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness". International Journal of Information and Education Technology 5, nr 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES". European International Journal of Multidisciplinary Research and Management Studies 02, nr 10 (11.10.2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Pełny tekst źródła
Streszczenie:
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
Style APA, Harvard, Vancouver, ISO itp.
8

Erceg, Aleksandar. "Information security". Tehnički glasnik 13, nr 2 (17.06.2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Pełny tekst źródła
Streszczenie:
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. Results have shown that the overall behaviour of respondents in production company is more responsible and security awareness with proper use of passwords is associated with knowledge about the importance of security application in their work. Further research is recommended.
Style APA, Harvard, Vancouver, ISO itp.
9

Kaushik, Saurav. "Information Security". International Journal for Research in Applied Science and Engineering Technology 8, nr 5 (31.05.2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Yamamoto, Akitomo. "Information Security". IEEJ Transactions on Electronics, Information and Systems 107, nr 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Information security"

1

Tyukala, Mkhululi. "Governing information security using organisational information security profiles". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Pełny tekst źródła
Streszczenie:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
Style APA, Harvard, Vancouver, ISO itp.
2

Åhlfeldt, Rose-Mharie. "Information Security in Home Healthcare". Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Pełny tekst źródła
Streszczenie:
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management. The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations. The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.
Style APA, Harvard, Vancouver, ISO itp.
3

Yucel, Okan. "Information System Security". Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Pełny tekst źródła
Streszczenie:
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the generated results were evaluated.
Style APA, Harvard, Vancouver, ISO itp.
4

Saltysh, S. "Information security: passwords". Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.

Pełny tekst źródła
Streszczenie:
Many people have accounts in different sites, and the problem is that hundreds of millions of passwords are being compromised by cybercriminals every year. People finally need to understand that the Internet is a very hostile place, while online service providers need to finally start taking network security seriously. One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
Style APA, Harvard, Vancouver, ISO itp.
5

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management". Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Pełny tekst źródła
Streszczenie:

The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.

Style APA, Harvard, Vancouver, ISO itp.
6

Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture". Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Style APA, Harvard, Vancouver, ISO itp.
7

Lund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.

Pełny tekst źródła
Streszczenie:
In the era of information, it has become vital for companies to make sure that their information is properly protected. They are therefore, willing to spend large amounts of resources on protecting their information. This can usually be done in a large variety of ways. The root of information security is first and foremost, having policies that regulate how information security is upheld. And secondly, by teaching employees proper practice of information security. These are however procedures that are not all that common in a university environment, and even more so in relation to students.   In order to explore this phenomenon further, an exploratory study have been carried out to find more information on the subject. This has been done in several ways in order to grasp as much information as possible. Firstly, by doing a literary study to find out what is already known within the field of information security in regard to students. Secondly, by doing a quantitative study that evaluates the student’s information security awareness. And lastly, by conducting an interview with a member of staff at a university to find out their attitude towards the phenomenon.    The thesis concludes by suggesting how universities might want to handle information security in relationship to students.
Style APA, Harvard, Vancouver, ISO itp.
8

Rastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Pełny tekst źródła
Streszczenie:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
Style APA, Harvard, Vancouver, ISO itp.
9

Björck, Fredrik. "Discovering information security management /". Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Talib, Shuhaili. "Personalising information security education". Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.

Pełny tekst źródła
Streszczenie:
Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal role. Even with the best of protection, an ill-informed person can effectively remove any protection the control might provide. Information security awareness is therefore imperative to ensure a population is well educated with respect to the threats that exist to one’s electronic information, and how to better protect oneself. Current information security awareness strategies are arguably lacking in their ability to provide a robust and personalised approach to educating users, opting for a blanket, one-size-fits-all solution. This research focuses upon achieving a better understanding of the information security awareness domain; appreciating the requirements such a system would need; and importantly, drawing upon established learning paradigms in seeking to design an effective personalised information security education. A survey was undertaken to better understand how people currently learn about information security. It focussed primarily upon employees of organisations, but also examined the relationship between work and home environments and security practice. The survey also focussed upon understanding how people learn and their preferences for styles of learning. The results established that some good work was being undertaken by organisations in terms of security awareness, and that respondents benefited from such training – both in their workplace and also at home – with a positive relationship between learning at the workplace and practise at home. The survey highlighted one key aspect for both the training provided and the respondents’ preference for learning styles. It varies. It is also clear, that it was difficult to establish the effectiveness of such training and the impact upon practice. The research, after establishing experimentally that personalised learning was a viable approach, proceeded to develop a model for information security awareness that utilised the already successful field of pedagogy and individualised learning. The resulting novel framework “Personalising Information Security Education (PISE)” is proposed. The framework is a holistic approach to solving the problem of information security awareness that can be applied both in the workplace environment and as a tool for the general public. It does not focus upon what is taught, but rather, puts into place the processes to enable an individual to develop their own information security personalised learning plan and to measure their progress through the learning experience.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Information security"

1

Drevin, Lynette, Suné Von Solms i Marianthi Theocharidou, red. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo i Rolly Intan, red. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Longley, Dennis, Michael Shain i William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mambo, Masahiro, i Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Stamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui i Siu Ming Yiu, red. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chan, Agnes Hui, i Virgil Gligor, red. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Gollmann, Dieter, i Felix C. Freiling, red. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Susilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li i Rolly Intan, red. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chen, Liqun, Mark Manulis i Steve Schneider, red. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Information security"

1

von Solms, S. H., i R. von Solms. "Information Security and Information Security Governance". W Information Security Governance, 1–11. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Fernando, Anjana, i Lakmal Warusawithana. "Information Security". W Beginning Ballerina Programming, 227–68. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Stanley, Richard. "Information Security". W Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Weik, Martin H. "information security". W Computer Science and Communications Dictionary, 778. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Fox, Richard. "Information Security". W Information Technology, 329–66. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Edward, Y. Uechi. "Information Security". W Public Service Information Technology, 155–82. Boca Raton : Taylor & Francis, 2020.: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Reveron, Derek S., i Kathleen A. Mahoney-Norris. "Information Security". W Human and National Security, 181–201. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weik, Martin H. "security information". W Computer Science and Communications Dictionary, 1535. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sheppey, Terence, i Ross McGill. "Information Security". W Sarbanes-Oxley, 277–96. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Neel, Andrew J. "Information Security". W Encyclopedia of Sciences and Religions, 1055–58. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_1220.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Information security"

1

Neogy, Sarmistha. "Information security". W IML 2017: International Conference on Internet of Things and Machine Learning. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

"Information Security". W 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

"Information security". W 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Carroll, Michael D. "Information security". W the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Селейдарян, Элина Михайловна, i Матвей Артёмович Лысенко. "INFORMATION SECURITY". W Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.

Pełny tekst źródła
Streszczenie:
В работе рассмотрены главные компоненты информации, ее влияние и значимость в современном мире. Автором анализируются предпринимаемые меры руководства страны по предотвращению войны в информационном пространстве. The paper considers the main components of information, its influence and significance in the modern world. The author analyses the measures taken by the country's leadership to prevent war in the information space.
Style APA, Harvard, Vancouver, ISO itp.
6

Alkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli i Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques". W 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wu, Yue, i Katalin Takacs-Gyorgy. "Information security of food security". W 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Amankwa, Eric, Marianne Loock i Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions". W 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Colbaugh, Richard, Kristin Glass i Travis Bauer. "Dynamic information-theoretic measures for security informatics". W 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cooper, Michael H. "Information security training". W the ACM SIGUCCS fall conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1629501.1629541.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Information security"

1

Bowen, P., J. Hash i M. Wilson. Information security handbook :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Tsang, Wai, Karen Burkardsmaier i Ed Scheidt. Information-Centric Security. Fort Belvoir, VA: Defense Technical Information Center, luty 2004. http://dx.doi.org/10.21236/ada421985.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer i Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2002. http://dx.doi.org/10.21236/ada407864.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

LOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Fort Belvoir, VA: Defense Technical Information Center, wrzesień 2001. http://dx.doi.org/10.21236/ada386363.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kissel, Richard. Small business information security :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lane, Brendan F., i Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada418505.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Quist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), kwiecień 1993. http://dx.doi.org/10.2172/6934153.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Moser, William S. The Economics of Information Security. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2002. http://dx.doi.org/10.21236/ada404567.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2001. http://dx.doi.org/10.21236/ada405011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rosenthal, David, Peter Samsel i Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, listopad 2002. http://dx.doi.org/10.21236/ada408503.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii