Search

Your search keyword '"information system security"' showing total 148 results

Search Constraints

Start Over You searched for: Descriptor "information system security" Remove constraint Descriptor: "information system security"
148 results on '"information system security"'

Search Results

52. Cyber insurance as an incentive for information system security.

53. Development of Virtue Ethics Based Security Constructs for Information Systems Trusted Workers.

54. Description of a Practical Application of an Information Security Audit Framework.

55. User Privacy in Web Search

56. A Conceptual Model Approach to Manage and Audit Information Systems Security.

57. Модель управления рисками информационной безопасности при нарастающей величине ущерба

58. Classification of Security Threats in Information Systems.

59. INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS

60. A Research Agenda for Security Engineering.

61. Analýza rizik informačního systému nakládajícího s osobními údaji.

62. Analysis of vulnerability assessment results based on CAOS.

63. Technology-push and need-pull roles in information system security diffusion.

65. THE IMPACT OF MALICIOUS AGENTS ON THE ENTERPRISE SOFTWARE INDUSTRY.

66. Integrating Disaster Recovery Plan Activities into the System Development Life Cycle.

67. An integrated conceptual model for information system security risk management supported by enterprise architecture management

68. A novel secure business process modeling approach and its impact on business performance.

69. Aligning social concerns with information system security: A fundamental ontology for social engineering.

70. Informationsäkerhet vid användning av SaaS : En studie om vilka aspekter som påverkar om informationsäkerheten höjs vid användning av Saas

71. Informations system security when using SaaS : A study of wich aspects affecting information system security when using SaaS

72. An Analytical Approach to Cost-Effective, Risk-Based Budgeting for Federal Information System Security.

73. Toward a Unified Model of Information Security Policy Compliance

74. Do Firms Underreport Information on Cyber-Attacks? Evidence from Capital Markets

75. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

76. Classification of Security Threats in Information Systems

77. A Highly Recoverable and Efficient Filesystem

78. VRE4EIC Deliverable 5.2 Implications for the VRE end-users to handle security, privacy and trust issues - first version

79. Daiktų interneto informacinės sistemos saugumo pagerinimo tyrimas

80. Varnostna politika podjetja

81. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

82. Does organisational culture affect dysfunctional behaviour in information system security?

83. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

84. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

85. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

86. User-centred security event visualisation

87. Defense against social engineering attacks

88. A risques multiples cadres théoriques multiples : le cas des cybers attaques dans les collectivités territoriales

90. INFORMATION SECURITY IMPROVEMENT WITH INTRODUCTION GROUP POLICIES IN A LARGE COMPANY

91. SECURING LOCAL AREA NETWORK OF CHOSEN BANK

92. PROJECT OF ISMS IMPLEMENTATION IN THE COMPANY ALPINA, D.O.O

93. INTRODUCTION OF SECURITY POLICY IN A MEDIUM ENTERPRISE

94. SECURITY ANALYSIS OF THE INFORMATION SYSTEM IN THE COMPANY STROKA PRODUKT D.O.O

95. A framework for integrating security in software development projects

96. User authentication : a state-of-the-art review.

97. Access rights as a part of information security in enterprises

98. Creativity and the mediating role of Social Capital in the domain of Information Systems Security

99. ZAŠTITA INFORMACIJSKIH SUSTAVA U POSLOVNOJ PRAKSI

100. The Use of Expert Systems in Information System Security

Catalog

Books, media, physical & digital resources