148 results on '"information system security"'
Search Results
2. Evaluation of Governance in Information Systems Security to Minimize Information Technology Risks
3. Audit Keamanan Sistem Informasi Manajemen Rumah Sakit Dengan Framework COBIT 2019 Pada RSUD Palembang BARI
4. Emotional Computing Technology Applications in Information Systems Security and Their Risk Prevention
5. The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation.
6. The Implementation of Failure Mode and Effects Analysis (FMEA) of the Information System Security on the Government Electronic Procurement Service (LPSE) System
7. Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in Malaysia.
8. The Influence of Ethical Beliefs and Attitudes, Norms, and Prior Outcomes on Cybersecurity Investment Decisions.
9. TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE.
10. Improving students' problem-solving ability through the 'information system security' project guided by the theory of inventive problem solving (TIPS).
11. Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey
12. System Administration
13. Effectiveness of Information SystemsSecurity, due to theImpact of Institutional Theory's Dimension on Employee Organizational Behavior
14. Toward a New Integrated Approach of Information Security Based on Governance, Risk and Compliance
15. IT Security Training and Awareness in the Multigenerational Workplace.
16. Information Systems Security in Organisations: A Critical Literature Review.
17. Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems.
18. Holistic Strategy-Based Threat Model for Organizations.
19. Analysing Security Checkpoints for an Integrated Utility-Based Information System
20. Password Security: An Empirical Study.
21. Study of the impact of human capital on information security at Mobilis Corporation of Béchar.
22. Holistic Strategy-Based Threat Model for Organizations.
23. Laboratory Information System Operations and Regulations
24. Towards Security Risk-Oriented Misuse Cases
25. Access Control Management Using Extended RBAC Model
26. Risk Assessment of Information System Security Based on Fuzzy Multiple Criteria Group AHP
27. A Security Audit Framework to Manage Information System Security
28. Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security
29. Co-operative Agents in Network Defence
30. Information Assurance Evaluation for Network Information Systems
31. Cyber Security Training and Awareness Through Game Play
32. IA in the Interest of National Security
33. Sistem za oddaljeno prilagajanje odjema električne energije z uporabo bločno verižne tehnologije
34. Intrusion Detection Using Ensemble of Soft Computing Paradigms
35. I
36. Monitoring System Security Using Neural Networks and Support Vector Machines
37. Future Issues in Information Systems Security
38. ENIGMA and PURPLE: How the Allies Broke German and Japanese Codes During the War
39. Enhancing SSADM with disaster recovery plan activities
40. IFIP TC-11
41. IFIP TC-11
42. Exceptionalism Redux: How Different Is Health Care Informatics?
43. A Framework for Dealing with and Specifying Security Requirements in Information Systems
44. Development of secure medical database systems
45. Ciphertext-Policy Attribute Based Encryption with Selectively-Hidden Access Policy
46. 安全等级对信息系统安全技术策略的影响研究----以防火墙和IDS技术组合为例
47. A highly recoverable and efficient filesystem.
48. Simulations of text encryption and decryption by applying vertical bit rotation algorithm
49. A PERSPECTIVE ON THE EVOLUTION OF INFORMATION SYSTEM SECURITY AUDITS: CHALLENGES AND IMPLICATIONS.
50. Survey on cyberspace security.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.