265 results on '"CISO"'
Search Results
2. Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective.
3. Silver Bullet Talks with Craig Froelich.
4. Silver Bullet Talks with Wafaa Mamilli.
5. Silver Bullet Talks with Bruce Potter.
6. A 55-nm, 0.86-Volt operation, 125MHz high speed, 75uA/MHz low power, wide voltage supply range 2M-bit split-gate embedded Flash.
7. Secure System Development for Integrated Cloud Applications.
8. Silver Bullet Talks with Gary Warzala.
9. Case Study on "Prita Mulyasari" and "Twin Hackers" in Indonesia.
10. IT Security Is From Mars, Software Security Is From Venus.
11. The Equifax Hack Revisited and Repurposed.
12. 4-Port isolated MOS modeling and extraction for mmW applications.
13. An Analysis of the Impact of Bus Contention on the WCET in Multicores.
14. Visualizing information on a sphere.
15. Substrate-integrated waveguide transitions to planar transmission-line technologies.
16. Notch-band UWB bandpass filter using slot-embedded short-circuited stub.
17. Intelligent CMOS control of RF MEMS capacitive switches.
18. The SCDOR Hack: Great Security Theater in Five Stages.
19. Disinformatics: The Discipline behind Grand Deceptions.
20. Design and Implementation of Fourth Arm for Elimination of Bearing Current in NPC-MLI-Fed Induction Motor Drive.
21. A Framework for Designing a Security Operations Centre (SOC).
22. Exploring the Shift in Security Responsibility.
23. A Dual-Parameter Optical Fiber SPR Sensor for Simultaneous Measurement of Glucose and Cholesterol Concentrations.
24. 1D thermal modelling of PMSM intended for an electric vehicle's powertrain.
25. Polydopamine Coated Gold Nano Blackbodies for Tumor-Selective Spatial Thermal Damage During Plasmonic Photothermal Cancer Therapy.
26. An Improved Method for the Modeling of Frequency-Dependent Amplitude-Versus-Offset Variations.
27. Auxiliary Power Supplies for High-Power Converter Submodules: State of the Art and Future Prospects.
28. Challenges in Certification and Accreditation.
29. Control System Cyber Incidents Are Real—and Current Prevention and Mitigation Strategies Are Not Working.
30. CHAPTER 4: THE MANAGEMENT STRATEGY: ASSIGNING INFORMATION SECURITY RESPONSIBILITIES.
31. High-Performance Isolated Gate-Driver Power Supply With Integrated Planar Transformer.
32. Framework for the Cosimulation of Antenna Arrays and Receivers.
33. Struggling With Supply-Chain Security.
34. Non-Invasive Estimation of Localized Dynamic Luminal Pressure Change by Ultrasound Elastography in Arteries With Normal and Abnormal Geometries.
35. A New Gate Drive Power Supply Configuration for Common Mode Conducted EMI Reduction in Phase-Shifted Full-Bridge Converter.
36. Microfibrous Mesh and Polymer Damping of Micromachined Vibration Isolators.
37. Historical Consciousness of Cyber Security in India.
38. Optimized, Omnidirectional Surface Acoustic Wave Source: 152° Y-Rotated Cut of Lithium Niobate for Acoustofluidics.
39. 300-GHz-Band 120-Gb/s Wireless Front-End Based on InP-HEMT PAs and Mixers.
40. Blockchain Meets Cloud Computing: A Survey.
41. Simulator of a Full Fetal Electrocardiogram Measurement Chain by Multichannel Capacitive Sensing.
42. Rock Stars of Cybersecurity [Advertisement].
43. Rock Stars of Cybersecurity [Advertisement].
44. Rock Stars of Cybersecurity House Advertisement.
45. Rock Stars of Cybersecurity House Advertisement.
46. Rock Stars of Cybersecurity [Advertisement].
47. Rock Stars of Cybersecurity [Advertisement].
48. Rock Stars of Cybersecurity [Advertisement].
49. InfoSec World Conference 2014 Trade.
50. 2008 IEEE Computer Society membership advertisement.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.