Showing 121 - 140 results of 8,047 for search '"information security"', query time: 2.64s Refine Results
  1. 121
    by Seeholzer, Roger V.
    Published 2015
    ...A fundamental understanding of the complexities comprising an information security strategy (ISS...
    Get full text
    Get full text
    Others
  2. 122
    by WU MEI SIA, 吳美霞
    Published 2008
    ...碩士 === 國立臺灣科技大學 === 管理研究所 === 96 === Since the risks of various kinds of information security...
    Get full text
    Others
  3. 123
    by Yu-Jen Wang, 王裕仁
    Published 2006
    ..., because there are many virus, worms and network attack in recent years. Information security has become...
    Get full text
    Others
  4. 124
    by Chen-Sheng Fan, 范振聲
    Published 2010
    ... information security. The research of how to balance real-time information exchange and network quarantine...
    Get full text
    Others
  5. 125
    by Coles-Kemp, Elizabeth
    Published 2008
    ...This thesis explores the different types of information security management decision making...
    Get full text
  6. 126
    by D. N. Bespalov, M. A. Kazakov
    Published 2014-12-01
    Subjects: ...information security...
    Get full text
    Article
  7. 127
    .... This study is aimed at examining the information security of the data in a teleradiology system that is used...
    Get full text
  8. 128
    by Bulgurcu, Burcu
    Published 2008
    Subjects: ...Information security awareness...
    Get full text
    Others
  9. 129
    by Thomson, Kerry-Lynn
    Published 2003
    ... component that should be a definitive part in the strategy of any organisation is information security...
    Get full text
    Others
  10. 130
    by Mahmood, Ashrafullah Khalid
    Published 2010
    Subjects: ...Information Security...
    Get full text
    Others
  11. 131
  12. 132
  13. 133
    by Trompeter, Colette
    Published 2008
    ...Organisations are under constant pressure to comply with information security requirements. However...
    Get full text
  14. 134
    by Tolnai, Annette
    Published 2010
    ... is the development of an information security awareness portal (ISAP) aimed at the general public and potential...
    Get full text
  15. 135
    by Von Solms, Rossouw
    Published 2014
    ..., integrity and privacy of this information at all times. This process is referred to as Information Security...
    Get full text
  16. 136
    by Venter, Diederik Petrus
    Published 2008
    ... challenge; it has to implement a system of information security management. Software applications can...
    Get full text
  17. 137
    by Etsebeth, Verine
    Published 2009
    ... and standards, to ensure that adequate information security exists within the organisation. The King II report...
    Get full text
  18. 138
    by Jun-Hong Chen, 陳俊宏
    Published 2013
    ...碩士 === 銘傳大學 === 資訊管理學系碩士班 === 101 === Since the Internet Worm event began, Information Security...
    Get full text
    Others
  19. 139
    by TSENG,WEN-CHUN, 曾文君
    Published 2015
    ... by using computers, and this made we all face even more severe threatens of information security. After...
    Get full text
    Others
  20. 140