Search

Your search keyword '"information system security"' showing total 148 results

Search Constraints

Start Over You searched for: Descriptor "information system security" Remove constraint Descriptor: "information system security"
148 results on '"information system security"'

Search Results

1. A New Architecture for Data Analysis on Blockchain Without Data Replication

2. Evaluation of Governance in Information Systems Security to Minimize Information Technology Risks

3. Audit Keamanan Sistem Informasi Manajemen Rumah Sakit Dengan Framework COBIT 2019 Pada RSUD Palembang BARI

4. Emotional Computing Technology Applications in Information Systems Security and Their Risk Prevention

5. The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation.

6. The Implementation of Failure Mode and Effects Analysis (FMEA) of the Information System Security on the Government Electronic Procurement Service (LPSE) System

7. Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in Malaysia.

8. The Influence of Ethical Beliefs and Attitudes, Norms, and Prior Outcomes on Cybersecurity Investment Decisions.

9. TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE.

10. Improving students' problem-solving ability through the 'information system security' project guided by the theory of inventive problem solving (TIPS).

11. Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey

13. Effectiveness of Information SystemsSecurity, due to theImpact of Institutional Theory's Dimension on Employee Organizational Behavior

15. IT Security Training and Awareness in the Multigenerational Workplace.

16. Information Systems Security in Organisations: A Critical Literature Review.

17. Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems.

18. Holistic Strategy-Based Threat Model for Organizations.

20. Password Security: An Empirical Study.

21. Study of the impact of human capital on information security at Mobilis Corporation of Béchar.

22. Holistic Strategy-Based Threat Model for Organizations.

24. Towards Security Risk-Oriented Misuse Cases

28. Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security

30. Information Assurance Evaluation for Network Information Systems

33. Sistem za oddaljeno prilagajanje odjema električne energije z uporabo bločno verižne tehnologije

40. IFIP TC-11

41. IFIP TC-11

45. Ciphertext-Policy Attribute Based Encryption with Selectively-Hidden Access Policy

46. 安全等级对信息系统安全技术策略的影响研究----以防火墙和IDS技术组合为例

47. A highly recoverable and efficient filesystem.

48. Simulations of text encryption and decryption by applying vertical bit rotation algorithm

49. A PERSPECTIVE ON THE EVOLUTION OF INFORMATION SYSTEM SECURITY AUDITS: CHALLENGES AND IMPLICATIONS.

50. Survey on cyberspace security.

Catalog

Books, media, physical & digital resources