Search

Your search keyword '"*COMPUTER networks in business enterprises"' showing total 286 results

Search Constraints

Start Over You searched for: Descriptor "*COMPUTER networks in business enterprises" Remove constraint Descriptor: "*COMPUTER networks in business enterprises" Topic security measures of computer networks in business enterprises Remove constraint Topic: security measures of computer networks in business enterprises
286 results on '"*COMPUTER networks in business enterprises"'

Search Results

1. IMPOSSIBLE MATH: THE NEED FOR GOVERNMENT-BACKED CYBER INSURANCE.

2. Building an Enterprise SOC and Risk Management Function.

3. Cybersecurity.

4. RANSOMWARE ON THE RISE: With attacks increasing in frequency and severity, experts offer advice for preparing a solid defence.

5. RULING THE NET.

6. Common sense and computer security.

7. One-time password authentication scheme based on the negative database.

8. NEW SECURITY THREATS FOR COMPANIES IN ROMANIA.

9. Supporting Business Privacy Protection in Wireless Sensor Networks.

10. SPECIAL LETTER: CYBER SECURITY IS EVERYONE'S BUSINESS.

11. HACKING CULTURE.

12. RANSOMWARE OR BUST? MAJORITY STILL DON'T PAY.

13. La falta de expertos en ciberseguridad obliga a recurrir a estudiantes.

14. COMPUTER SECURITY: WHAT CAN BE DONE.

15. BALANCING THE BREACH: DATA PRIVACY LAWS IN THE WAKE OF THE NSA REVELATIONS.

16. Organizational Privacy Strategy: Four Quadrants of Strategic Responses to Information Privacy and Security Threats.

17. CHAPTER 8: SECURING YOUR WEB- BASED BUSINESS.

18. SECURITY THREAT SOURCES AND SUPPLIERS: A MANAGEMENT THREAT PROCESS MODEL.

19. Schatten-IT: Implikationen und Handlungsempfehlungen für Mobile Security.

20. THE 17TH GLOBAL INFORMATION SECURITY SURVEY.

21. Is Security Realistic In Cloud Computing?

22. ASSEMBLE THE DECISION-MAKERS: Security projects may require input from departments across the organization.

23. A Study of Performative Hactivist Subcultures and Threats to Businesses.

24. A Markov Decision Process Model for High Interaction Honeypots.

25. Checklists: Prevent white-collar computer crime.

26. What Is Critical to Your Infrastructure?

27. A new comprehensive framework for enterprise information security risk management.

28. The implementation guidance for practicing network isolation by referring to ISO-17799 standard

29. From Ancient Fortress to Modern Cyberdefense.

30. A security policy framework for context-aware and user preferences in e-services

31. Information security goes green.

32. Security: The Virtual Quest.

33. TARGETING DATA TERRORISTS.

34. The State of Enterprise Video.

35. How Vulnerable Are We?

36. Building Risk Resilience.

37. Secure Your Web Apps with Web Application Firewalls.

38. Building solid foundations: the case for data classification

39. Security for virtual private intranets.

40. STRATEGIZING FOR BETTER TIMES.

41. "The social media phishing problem can be described in just two words: exaggerated trust".

42. What will It Take?

43. From culture to disobedience: Recognising the varying user acceptance of IT security

44. Modeling of RBAC-based access control of virtual enterprise.

45. 3 strikes, you're out.

46. ALL ABOARD!

47. INTERNET PROTOCOL IDENTIFICATION (IPID) STEALTH SCANNING.

48. BRINGING EFFECTIVE USER ACCOUNT MANAGEMENT INTO REACH.

49. Data Integrity Assurance in a Layered Security Strategy

50. SECURITY RED ALERT.

Catalog

Books, media, physical & digital resources