Search Results - "Information security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 109
- Security measures 72
- Computer networks 53
- Data protection 44
- Management 29
- Information technology 21
- Access control 15
- Computers 11
- Information resources management 8
- Congresses 7
- Data encryption (Computer science) 7
- Business enterprises 6
- Computer crimes 6
- Cryptography 6
- Risk assessment 6
- Business intelligence 4
- Computer Security 4
- Data processing 4
- Electronic data processing departments 4
- Internet 4
- Management information systems 4
- Computer architecture 3
- Confidential business information 3
- Database security 3
- Handbooks, manuals, etc 3
- Investigation 3
- Law and legislation 3
- Prevention 3
- Standards 3
- Business 2
-
141
Synchronizing internet protocol security (sipsec)
Published 2007“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
142
Security for telecommunications networks
Published 2008“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
143
Adaptive cryptographic access control
Published 2010“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
144
Spyware and adware
Published 2011“…Advances in information security…”
Click Here to View Status and Holdings.
Unknown -
145
Cyber Warfare Building the Scientific Foundation
Published 2015“…Advances in information security…”
Click Here to View Status and Holdings.
Manuscript Book -
146
Role-based access control
Published 2007“…Artech House information security and privacy series…”
Click Here to View Status and Holdings.
Unknown -
147
Introduction to identity-based encryption
Published 2008“…Artech House information security and privacy series…”
Click Here to View Status and Holdings.
Unknown -
148
Role engineering for enterprise security management
Published 2008“…Artech House information security and privacy series…”
Click Here to View Status and Holdings.
Unknown -
149
Cryptography for security and privacy in cloud computing
Published 2014“…rtech House information security and privacy series…”
Click Here to View Status and Holdings.
Unknown -
150
Control and security of e-commerce
Published 2004Table of Contents: “…Introduction -- Legal issues related to e-commerce -- Information security -- Certificates and non-repudiation -- Protecting the e-commerce environment -- Protecting e-commerce data -- Auditing an e-commerce application…”
Click Here to View Status and Holdings.
Unknown -
151
THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments
Published 2020Table of Contents: “…Introduction. Information Security Risk Assessment Basics. Project Definition. …”
Click Here to View Status and Holdings.
Book -
152
-
153
-
154
Building a GIS system architecture design strategies for managers
Published 2012Table of Contents: “…I: Understanding the GIS software technology -- System design process -- GIS software technology -- Software performance -- GIS data administration -- II: Understanding the IT infrastructure -- Network communications -- GIS product architecture -- Platform performance -- Information security -- III: Putting it all together -- Performance fundamentals -- Capacity planning tool -- City of Rome case study -- System implementation.…”
Click Here to View Status and Holdings.
Unknown -
155
Business driven information systems
Published 2009Table of Contents: “…Information systems in business -- Strategic decision making -- Ebusiness -- Ethics and information security -- Enterprise architectures -- Databases and data warehouses -- Networks, telecommunications, and mobile technology -- Operations management and supply chain management -- Customer relationship management and business intelligence -- Enterprise resource planning and collaboration systems -- Systems development and project management -- Globalization, Innovation, and 21st century organizational trends…”
Click Here to View Status and Holdings.
Unknown -
156
-
157
Forensic accounting and fraud examination
Published 2012Click Here to View Status and Holdings.
Book -
158
-
159
-
160
INFORMATION SYSTEMS MANAGEMENT IN PRACTICE
Published 1989Click Here to View Status and Holdings.
Book