Gotowa bibliografia na temat „Information security practice tests”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Information security practice tests”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Information security practice tests"
Li, Chengcheng. "Penetration Testing Curriculum Development in Practice". Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Pełny tekst źródłaSamios, Michael, Christos P. Evangelidis i Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment". Seismological Research Letters 92, nr 2A (10.02.2021): 933–40. http://dx.doi.org/10.1785/0220200151.
Pełny tekst źródłaRohn, Eli, Gilad Sabari i Guy Leshem. "Explaining small business InfoSec posture using social theories". Information & Computer Security 24, nr 5 (14.11.2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Pełny tekst źródłaIkhalia, Ehinome, Alan Serrano, David Bell i Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app". Information Technology & People 32, nr 5 (7.10.2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Pełny tekst źródłaYang, Wei, i Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance". Security and Communication Networks 2021 (5.03.2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.
Pełny tekst źródłaKubiak, Ireneusz, i Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays". Applied Sciences 12, nr 10 (23.05.2022): 5281. http://dx.doi.org/10.3390/app12105281.
Pełny tekst źródłaRicciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, Giuseppe Cesarelli, Francesco De Nola, Roberto Ruggiero, Ludovico Docimo i Giovanni Improta. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle". Healthcare 10, nr 1 (8.01.2022): 124. http://dx.doi.org/10.3390/healthcare10010124.
Pełny tekst źródłaMundt, Christopher C. "Pyramiding for Resistance Durability: Theory and Practice". Phytopathology® 108, nr 7 (lipiec 2018): 792–802. http://dx.doi.org/10.1094/phyto-12-17-0426-rvw.
Pełny tekst źródłaAkashi, Nozomi, Kohei Nakajima, Mitsuru Shibayama i Yasuo Kuniyoshi. "A mechanical true random number generator". New Journal of Physics 24, nr 1 (1.01.2022): 013019. http://dx.doi.org/10.1088/1367-2630/ac45ca.
Pełny tekst źródłaMeira, Jessica Vieira de Souza, Murat Hancer, Sara Joana Gadotti dos Anjos i Anita Eves. "Human resources practices and employee motivation in the hospitality industry: A cross-cultural research". Tourism and hospitality management 29, nr 2 (2023): 157–67. http://dx.doi.org/10.20867/thm.29.2.1.
Pełny tekst źródłaRozprawy doktorskie na temat "Information security practice tests"
Ashenden, D. M. "Information security awareness : improving current research and practice". Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Pełny tekst źródłaWilliams, Patricia A. "An investigation into information security in general medical practice". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Pełny tekst źródłaHove, Cathrine, i Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Pełny tekst źródłaMahncke, Rachel J. "Measuring and applying information security governance within general medical practice". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.
Pełny tekst źródłaMirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker". Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.
Pełny tekst źródłaVega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices". Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.
Pełny tekst źródłaPh. D.
Shear, Christopher James. "Business counterintelligence : sustainable practice or passing fad?" Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/1930.
Pełny tekst źródłaTraditional information protection mechanisms are no longer adequately placed to effectively deal with the adversarial threats that have arisen as a result of the rise in importance of knowledge for today’s organisations. Business counterintelligence appears to be a protective entity, which in principle can effectively engage with and mitigate many of these newly manifested threats. Yet, business counterintelligence is also an entity that is accompanied by a great deal of haze and confusion as to its use, implementation and integration within different organisations. This is evident from the literature where there currently exist multiple fragmented definitions of what business counterintelligence is. Organisations may as a result adopt a particular business counterintelligence definition that may not be effective for their context. This can result in the ineffective protection of critical information assets and the misappropriation of organisational resources; something which is not sustainable. This thesis proposes that in order to allay the confusion caused by these differing fragmented definitions, one needs to be able to arrive at a consolidated definition of what constitutes business counterintelligence; this thesis’s primary objective. This has been examined by firstly contextualising business counterintelligence in order to better understand the topic; the information society was used as a backdrop for this purpose. Secondly, an examination of the prevailing views of business counterintelligence and its role within organisations is offered in order to build clarity. Thirdly, a consolidated definition of business counterintelligence is proposed and its implications for different organisations examined. Finally, the implications of this consolidated definition for the sustainability of business counterintelligence are discussed and conclusions based on the evidence presented within the thesis drawn. Based on the arguments presented, this thesis postulates that a consolidated definition of business counterintelligence is more effective and is thus more sustainable.
Sestorp, Isak, i André Lehto. "CPDLC in Practice : A Dissection of the Controller Pilot Data Link Communication Security". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159840.
Pełny tekst źródłaSarmonpal, Sandra. "Learning Analytics from Research to Practice| A Content Analysis to Assess Information Quality on Product Websites". Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421041.
Pełny tekst źródłaThe purpose of this study was to examine and describe the nature of the research to practice gap in learning analytics applications in K12 educational settings. It was also the purpose of this study to characterize how learning analytics are currently implemented and understood. A secondary objective of this research was to advance a preliminary learning analytics implementation framework for practitioners. To achieve these purposes, this study applied quantitative content analysis using automated text analysis techniques to assess the quality of information provided on analytics-based product websites against learning analytics research. Because learning analytics implementations require adoption of analytical tools, characterizing content on analytics-based product websites provides insight into data practices in K12 schools and how learning analytics are practiced and understood. A major finding of this study was that learning analytics do not appear to be applied in ways that will improve learning outcomes for students as described by the research. A second finding was that policy influence expressed in the study corpus suggest competing interests within the current policy structure for K12 education settings. Keywords: quantitative content analysis, automated text analysis, learning analytics, big data, frameworks, educational technology, website content analysis
Nguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking". Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Pełny tekst źródłaThe current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
Książki na temat "Information security practice tests"
Christy, S. Russell, i Chuck Easttom. CompTIA® Security+® Practice Tests. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549413.
Pełny tekst źródłaDeng, Robert, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng i Ding Wang, red. Information Security Practice and Experience. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93206-0.
Pełny tekst źródłaAkram, Raja Naeem, i Sushil Jajodia, red. Information Security Theory and Practice. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24018-3.
Pełny tekst źródłaBao, Feng, Hui Li i Guilin Wang, red. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00843-6.
Pełny tekst źródłaLaurent, Maryline, i Thanassis Giannetsos, red. Information Security Theory and Practice. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41702-4.
Pełny tekst źródłaChen, Liqun, Yi Mu i Willy Susilo, red. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79104-1.
Pełny tekst źródłaKwak, Jin, Robert H. Deng, Yoojae Won i Guilin Wang, red. Information Security, Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1.
Pełny tekst źródłaDeng, Robert H., i Tao Feng, red. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4.
Pełny tekst źródłaHeng, Swee-Huay, i Javier Lopez, red. Information Security Practice and Experience. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2.
Pełny tekst źródłaRyan, Mark D., Ben Smyth i Guilin Wang, red. Information Security Practice and Experience. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2.
Pełny tekst źródłaCzęści książek na temat "Information security practice tests"
Li, Xiehua, Shutang Yang, Jianhua Li i Hongwen Zhu. "Security Protocol Analysis with Improved Authentication Tests". W Information Security Practice and Experience, 123–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_12.
Pełny tekst źródłaPark, Heejin, Sang Kil Park, Ki-Ryong Kwon i Dong Kyue Kim. "Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications". W Information Security Practice and Experience, 74–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31979-5_7.
Pełny tekst źródłaZhou, Xuhua, Xuhua Ding i Kefei Chen. "Lightweight Delegated Subset Test with Privacy Protection". W Information Security Practice and Experience, 138–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21031-0_11.
Pełny tekst źródłaCai, Jun, Jian-Zhen Luo, Jianliang Ruan i Yan Liu. "Toward Fuzz Test Based on Protocol Reverse Engineering". W Information Security Practice and Experience, 892–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_56.
Pełny tekst źródłaZhao, Hui, Yongbin Zhou, François-Xavier Standaert i Hailong Zhang. "Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers". W Information Security Practice and Experience, 336–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_24.
Pełny tekst źródłaAzad, Nasreen. "DevOps Challenges and Risk Mitigation Strategies by DevOps Professionals Teams". W Lecture Notes in Business Information Processing, 369–85. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_26.
Pełny tekst źródłaFan, Limin, Hua Chen i Si Gao. "A General Method to Evaluate the Correlation of Randomness Tests". W Information Security Applications, 52–62. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_4.
Pełny tekst źródłade Carvalho, Luciano Gonçalves, i Marcelo Medeiros Eler. "Security Requirements and Tests for Smart Toys". W Enterprise Information Systems, 291–312. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93375-7_14.
Pełny tekst źródłaKaksonen, Rauli, Kimmo Halunen, Marko Laakso i Juha Röning. "Transparent Security Method for Automating IoT Security Assessments". W Information Security Practice and Experience, 138–53. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-7032-2_9.
Pełny tekst źródłaMittelbach, Arno, i Marc Fischlin. "Iterated Hash Functions in Practice". W Information Security and Cryptography, 585–618. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63287-8_15.
Pełny tekst źródłaStreszczenia konferencji na temat "Information security practice tests"
Linenberg, Amos. "Continuous on Site Monitoring of VOCs in Water Sources". W ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4677.
Pełny tekst źródłaPoon, Anthony, Sarah Giroux, Parfait Eloundou-Enyegue, François Guimbretière i Nicola Dell. "Baccalauréat Practice Tests in Cameroon". W ICTD2020: Information and Communication Technologies and Development. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3392561.3394646.
Pełny tekst źródłaMouelhi, Tejeddine, Yves Le Traon i Benoit Baudry. "Mutation Analysis for Security Tests Qualification". W Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taic.part.2007.21.
Pełny tekst źródłaMouelhi, Tejeddine, Yves Le Traon i Benoit Baudry. "Mutation Analysis for Security Tests Qualification". W Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taicpart.2007.4344128.
Pełny tekst źródłaKozhurkina, Olesia Alekseevna. "Information security in legal activities". W International Research-to-practice conference, chair Ilia Pavlovich Mikhnev. TSNS Interaktiv Plus, 2018. http://dx.doi.org/10.21661/r-467735.
Pełny tekst źródłaBlock, Shannon, Steven Munkeby i Samuel Sambasivam. "An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness". W InSITE 2021: Informing Science + IT Education Conferences. Informing Science Institute, 2021. http://dx.doi.org/10.28945/4763.
Pełny tekst źródłaGonçalves de Carvalho, Luciano, i Marcelo Medeiros Eler. "Security Tests for Smart Toys". W 20th International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006776101110120.
Pełny tekst źródłaVaduva, Janalexandru, Raduemanuel Chiscariu, Ioana Culic, Iuliamaria Florea i Razvan Rughinis. "ADREM: SYSTEM CALL BASED INTRUSION DETECTION FRAMEWORK". W eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-021.
Pełny tekst źródłaSimms, David John. "Information Security Optimization: From Theory to Practice". W 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.106.
Pełny tekst źródłaMitkovskiy, Alexey, Andrey Ponomarev i Andrey Proletarskiy. "SIEM-PLATFORM FOR RESEARCH AND EDUCATIONAL TASKS ON PROCESSING OF SECURITY INFORMATION EVENTS". W eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-143.
Pełny tekst źródłaRaporty organizacyjne na temat "Information security practice tests"
Pilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk i Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, kwiecień 2021. http://dx.doi.org/10.31812/123456789/4374.
Pełny tekst źródłaGoodwin, Sarah, Yigal Attali, Geoffrey LaFlair, Yena Park, Andrew Runge, Alina von Davier i Kevin Yancey. Duolingo English Test - Writing Construct. Duolingo, marzec 2023. http://dx.doi.org/10.46999/arxn5612.
Pełny tekst źródłaCarle, Steven, Mavrik Zavarin i Andrew Tompson. Review of Cavity Radius and Chimney Height Information for Underground Nuclear Tests at Nevada National Security Site. Office of Scientific and Technical Information (OSTI), styczeń 2021. http://dx.doi.org/10.2172/1762870.
Pełny tekst źródłaRuiz-Vega, Mauricio, Ana Corbacho i Martín Ardanaz. Mind the Gap: Bridging the Perception and Reality of Crime Rates with Information. Inter-American Development Bank, sierpień 2014. http://dx.doi.org/10.18235/0011650.
Pełny tekst źródłaSergeev, Alexander, Nikolay Litusov, Ekaterina Voroshilina, Alexey Kozlov, Yulia Grigoryeva, Danila Zornikov, Vasily Petrov i in. Electronic educational resource Microbiology, virology and immunology. SIB-Expertise, styczeń 2024. http://dx.doi.org/10.12731/er0769.29012024.
Pełny tekst źródłaDinovitzer, Aaron. PR-214-134502-R01 Weld Hydrogen Cracking Risk Management Guide. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2019. http://dx.doi.org/10.55274/r0011591.
Pełny tekst źródłaMacedo, Jorge, Paul Mayne, Sheng Dai, Paola Torres, Cody Arnold, Luis Vergaray i Yumeng Zhao. Cone Penetration Testing for Illinois Subsurface Characterization and Geotechnical Design. Illinois Center for Transportation, maj 2024. http://dx.doi.org/10.36501/0197-9191/24-013.
Pełny tekst źródłaVilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, marzec 2013. http://dx.doi.org/10.18235/0011448.
Pełny tekst źródłaZevotek, Robin, i Steve Kerber. Fire Service Summary Report: Study of the Effectiveness of Fire Service Positive Pressure Ventilation During Fire Attack in Single Family Homes Incorporating Modern Construction Practices. UL Firefighter Safety Research Institute, maj 2016. http://dx.doi.org/10.54206/102376/ncck4947.
Pełny tekst źródłaZevotek, Robin, i Steve Kerber. Study of the Effectiveness of Fire Service Positive Pressure Ventilation During Fire Attack in Single Family Homes Incorporating Modern Construction Practices. UL Firefighter Safety Research Institute, maj 2016. http://dx.doi.org/10.54206/102376/gsph6169.
Pełny tekst źródła