265 results on '"CISO"'
Search Results
102. MAVEN information security governance, risk management, and compliance (GRC): Lessons learned.
103. Exploiting Social Networks for the Prediction of Social and Civil Unrest: A Cloud Based Framework.
104. Yikes! Are plant control and power assets safe from cyber-attacks?
105. A Ziv-Zakaï type bound for hybrid parameter estimation.
106. Combatting phishing: A holistic human approach.
107. Quantitative Risk Management for Communication and Information Systems: State-of-the-Art and Challenges.
108. CHAPTER 7: TRANSFORMERS: 7.2. SINGLE-PHASE TRANSFORMERS.
109. Resolving the password security purgatory in the contexts of technology, security and human factors.
110. Highly sensitive tunable diode laser spectrometers for in situ planetary exploration.
111. Chapter 4: RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS: 4.2 IMPACT ANALYSIS.
112. iOS encryption systems: Deploying iOS devices in security-critical environments.
113. Loss reduction via network reconfigurations in Distribution Networks with Photovoltaic Units Installed.
114. IT Service Continuity: Achieving Embeddedness through Planning.
115. Chapter: 9 Circuit Techniques: 9.5 Circuits for Polar-to-Rectangular Conversion.
116. Chapter: 9 Circuit Techniques: 9.4 Circuits for Rectangular-to-Polar Conversion.
117. Corporate IT Risk Management model: A holistic view at managing information system security risks.
118. Comparative analysis of AC DC Microgrids for the Saudi Arabian distribution system.
119. Using APAS theorem to improve the autocorrelation performance of Chebyshev chaotic sequence.
120. Multi-agent Simulation of Continental, Regional, and Micro Electricity Markets.
121. Bottom-up capacities inference for health indicator fusion within multi-level industrial systems.
122. Fundamentals of Grounding Design.
123. Optimization of integrated electro-absorption modulated laser structures for 100 Gbit/s ethernet using electromagnetic simulation.
124. Research and realization of personalized search engine based on Ontology.
125. Single-Wafer Pressure Capacitive Sensor.
126. CHAPTER 5: CASE STUDIES: CASE STUDY 2-RANCHO NACHOS MOSQUITO ABATEMENT DISTRICT.
127. INDEX.
128. Capacitive pressure microsensor fabricated by bulk micromachining and sacrificial layer etching.
129. Partial Decision Aggregation for Electrotechnical Parts Quality Control.
130. Assessment of enterprise information security - the importance of prioritization $.
131. A Robust Positioning Technique in DR/GPS using the Receding Horizon Sigma Point Kalman FIR Filter.
132. Advanced tandem compound combined cycle governor model for KL-MSC island system.
133. A case study in rapid introduction of an information assurance track into a software engineering curriculum.
134. Detection and Conditioning of the Surface EMG Signal.
135. Performance of woven convolutional codes with BCJR algorithm.
136. Modeling of Neuronal Systems.
137. On the monte carlo simulation of optical MEMS components.
138. Chapter II: SAMPLING AND QUANTIZING: A. THE THEORY OF SAMPLING.
139. High-speed InP/InGaAs DHBTs with a thin pseudomorphic base.
140. Chapter 11: Long-term plume models: 11.1 Various long-term plume models.
141. Chapter 16: Validation, evaluation, qualification, confirmation and assessment.
142. Fast algorithm for adaptive estimation of principal and minor components.
143. A 1 V CMOS analog comparator using auto-zero and complementary differential-input technique.
144. Evaluation of packet loss probability in Bluetooth networks.
145. Nanostructured surfaces for dramatic reduction of flow resistance in droplet-based microfluidics.
146. An improved two-resistors compact thermal model by means of modified top-surface-area.
147. Rock Stars of Cybersecurity.
148. Rock Stars of Cybersecutiry [Advertisement].
149. Rock Stars of Cybersecurity [Advertisement].
150. Rock Stars of Cybersecurity House Advertisement.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.