Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
35
Computer security
24
Security of data
15
Information security
14
QA76 Computer software
11
information security
10
Cryptography
8
Network security
8
Computer science
7
TK Electrical engineering. Electronics Nuclear engineering
6
Data mining
5
Information systems
5
Security
5
T58.5-58.64 Information technology
5
Cloud computing
4
Data privacy
4
History of engineering and technology
4
Information use
4
Technology: general issues
4
article
4
human
4
Authentication
3
Blockchain
3
Cloud Computing
3
Computer networking and communications
3
Cyber security
3
Cybersecurity
3
Data protection
3
Information Security
3
Information management
3
-
121by Seeholzer, Roger V.“...A fundamental understanding of the complexities comprising an information security strategy (ISS...”
Published 2015
Get full text
Get full text
Others -
122“...碩士 === 國立臺灣科技大學 === 管理研究所 === 96 === Since the risks of various kinds of information security...”
Get full text
Others -
123“..., because there are many virus, worms and network attack in recent years. Information security has become...”
Get full text
Others -
124“... information security. The research of how to balance real-time information exchange and network quarantine...”
Get full text
Others -
125by Coles-Kemp, Elizabeth“...This thesis explores the different types of information security management decision making...”
Published 2008
Get full text
-
126
-
127by Psaros, Vasiliki Chrisovalantou“.... This study is aimed at examining the information security of the data in a teleradiology system that is used...”
Published 2008
Get full text
-
128by Bulgurcu, BurcuSubjects: “...Information security awareness...”
Published 2008
Get full text
Others -
129by Thomson, Kerry-Lynn“... component that should be a definitive part in the strategy of any organisation is information security...”
Published 2003
Get full text
Others -
130by Mahmood, Ashrafullah KhalidSubjects: “...Information Security...”
Published 2010
Get full text
Others -
131
-
132
-
133by Trompeter, Colette“...Organisations are under constant pressure to comply with information security requirements. However...”
Published 2008
Get full text
-
134by Tolnai, Annette“... is the development of an information security awareness portal (ISAP) aimed at the general public and potential...”
Published 2010
Get full text
-
135by Von Solms, Rossouw“..., integrity and privacy of this information at all times. This process is referred to as Information Security...”
Published 2014
Get full text
-
136by Venter, Diederik Petrus“... challenge; it has to implement a system of information security management. Software applications can...”
Published 2008
Get full text
-
137by Etsebeth, Verine“... and standards, to ensure that adequate information security exists within the organisation. The King II report...”
Published 2009
Get full text
-
138“...碩士 === 銘傳大學 === 資訊管理學系碩士班 === 101 === Since the Internet Worm event began, Information Security...”
Get full text
Others -
139“... by using computers, and this made we all face even more severe threatens of information security. After...”
Get full text
Others -
140