Статті в журналах з теми "Information security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Information security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (August 30, 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Повний текст джерелаImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Повний текст джерелаNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Повний текст джерелаKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Повний текст джерелаMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Повний текст джерелаHumaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Повний текст джерелаAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (October 11, 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Повний текст джерелаErceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (June 17, 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Повний текст джерелаKaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (May 31, 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Повний текст джерелаYamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Повний текст джерелаJesan, John Peter. "Information security." Ubiquity 2006, January (January 2006): 2. http://dx.doi.org/10.1145/1119621.1117695.
Повний текст джерелаSilic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (July 8, 2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.
Повний текст джерелаLaybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (June 2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.
Повний текст джерелаYang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Повний текст джерелаSharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Повний текст джерелаDunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (July 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Повний текст джерелаWendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. 7 (July 28, 2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.
Повний текст джерелаSingh, Lisha, Sahil Sharma, and Sneh Rathore. "Secure101: Automatic Surveillance and Information Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.
Повний текст джерелаDomozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.
Повний текст джерелаKavaljiev, Todor. "Information in providing security and prosperity." Information & Security: An International Journal 1, no. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.
Повний текст джерелаTagarev, Peter. "National Security Concepts and Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.
Повний текст джерелаSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (October 1, 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Повний текст джерелаLestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology." IJIIS: International Journal of Informatics and Information Systems 7, no. 1 (January 7, 2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.
Повний текст джерелаMorita, Hikaru, and Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, no. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.
Повний текст джерелаBondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.
Повний текст джерелаLIDERMAN, Krzysztof, and Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY." National Security Studies 4, no. 1 (December 1, 2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.
Повний текст джерелаHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Повний текст джерелаKuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (July 1, 2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Повний текст джерелаJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (January 2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Повний текст джерелаvon Solms, Basie, and Rossouw von Solms. "From information security to…business security?" Computers & Security 24, no. 4 (June 2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.
Повний текст джерелаvon Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.
Повний текст джерелаMartins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Повний текст джерелаLim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Повний текст джерелаSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (August 1, 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Повний текст джерелаLiang, Yingbin, H. Vincent Poor, and Shlomo Shamai (Shitz). "Information Theoretic Security." Foundations and Trends® in Communications and Information Theory 5, no. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.
Повний текст джерелаBoychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Повний текст джерелаWu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (January 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Повний текст джерелаKnapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr., and F. Nelson Ford. "Information Security Effectiveness." International Journal of Information Security and Privacy 1, no. 2 (April 2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.
Повний текст джерелаJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Повний текст джерелаЛихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (December 25, 2012): 70–73. http://dx.doi.org/10.12737/162.
Повний текст джерелаDotson, Daniel S. "Information Security Resources." Science & Technology Libraries 27, no. 3 (July 10, 2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.
Повний текст джерелаGifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (December 1988): 26–30. http://dx.doi.org/10.1109/45.31568.
Повний текст джерелаFried, Louis. "DISTRIBUTED INFORMATION SECURITY." Information Systems Management 10, no. 3 (January 1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.
Повний текст джерелаTsujii, Shigeo. "On Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.
Повний текст джерелаPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (November 2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Повний текст джерелаTipton, Harold, and Micki Krause. "Information Security Management." EDPACS 27, no. 12 (June 2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.
Повний текст джерелаFitzgerald, Kevin J. "Information security baselines." Information Management & Computer Security 3, no. 2 (May 1995): 8–12. http://dx.doi.org/10.1108/09685229510088575.
Повний текст джерелаWilliams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (September 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Повний текст джерелаEloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.
Повний текст джерелаLundgren, Björn, and Niklas Möller. "Defining Information Security." Science and Engineering Ethics 25, no. 2 (November 15, 2017): 419–41. http://dx.doi.org/10.1007/s11948-017-9992-1.
Повний текст джерела