Search

Your search keyword '"Information technology security"' showing total 94 results

Search Constraints

Start Over You searched for: Descriptor "Information technology security" Remove constraint Descriptor: "Information technology security" Database OpenAIRE Remove constraint Database: OpenAIRE
94 results on '"Information technology security"'

Search Results

3. ПОДГОТОВКА БУДУЩИХ ОФИЦЕРОВ ВОЙСК НАЦИОНАЛЬНОЙ ГВАРДИИ РОССИЙСКОЙ ФЕДЕРАЦИИ В ОБЛАСТИ ИНФОРМАЦИОННО-ТЕХНОЛОГИЧЕСКОЙ БЕЗОПАСНОСТИ

5. Kill Chain Attack Modelling for Hidden Channel Attack Scenarios in Industrial Control Systems

7. Analysis of Csirt Services in Facing Cyber Security Challenges in Indonesia

8. Protection Profile Bricks for Secure IoT Devices

9. Cyber Fraud: Detection and Analysis of the Crypto-Ransomware

10. EVALUASI TATA KELOLA KEAMANAN TEKNOLOGI INFORMASI MENGGUNAKAN INDEKS KAMI UNTUK PERSIAPAN STANDAR SNI ISO/IEC 27001 (STUDI KASUS: STMIK MARDIRA INDONESIA)

11. Information Security Policy Compliance: Systematic Literature Review

12. Audit Manajemen Keamanan Teknologi Informasi Menggunakan Standar ISO 27001 : 2005 Di PerguruanTinggi XYZ

13. Software Vulnerabilities and Bug Bounty Programs

14. To the Question of Ensuring the Information and Technological Security of Students in the Primary School

15. Исследование каналов утечки информации и несанкционированного доступа

16. Software vulnerabilities and bug bounty programs

17. Анализ существующих и перспективных методов защиты информации

18. Introduction to the book

19. Supporting students’ knowledge and skills in information technology security through a security portal

20. Application of AI Technology in Defense of Big Data Network Security

21. An analysis of strategic and economic values of business ethics

22. Practical Data Security

24. The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation

25. The impact of data security on firm value : how do stock markets react to data breach announcements?

26. Cluster Analysis of IT Security Risks in Chosen Sectors

27. Strengthening information technology security through the failure modes and effects analysis approach

28. Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints

29. Análisis de los Componentes de la Seguridad desde una Perspectiva Sistémica de la Dinámica de Sistemas

30. The impact of security awareness on information technology professionals' behavior

31. The Categorization and Information Technology Security of Automated Vehicles

33. Information Technology Security as Scored by Management Budget

34. Tales from the Trenches

35. Filtering Intrusion Detection Alarms using Ant Clustering Approach

36. INTEGRATING INTERNAL CONTROL FRAMEWORKS FOR EFFECTIVE CORPORATE INFORMATION TECHNOLOGY GOVERNANCE

38. Experience in the Formation of Competencies in the Field of Information Technology Security in the Educational Programs of MIEM NRU HSE

39. Information Technology Security Threats to Modern e-Enabled Aircraft: A Cautionary Note

40. A Comparative Assessment of Computer Security Incidence Handling

41. Hotel Information Technology Security: Do Hoteliers Understand the Risks?

43. Common Criteria: Origins and Overview

44. Industry Specific Q&A

45. Development of Unidirectional Security Gateway Satisfying Security Functional Requirements

46. User Link Prediction based on Logistic Regression Model with Local Similarity Indices in Microblog Network

47. The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal

48. Investing in IT Security

49. JRMAD METHOD USES OF INFORMATION TECHNOLOGY SECURITY / JRMAD METODO PANAUDOJIMAS TAIKANT INFORMACINIŲ TECHNOLOGIJŲ SAUGOS POLITIKĄ

Catalog

Books, media, physical & digital resources