Works matching DE "SECURITY management"
1
- ISACA Journal, 2025, n. 3, p. 9
- Article
2
- ISACA Journal, 2025, n. 3, p. 3
- Article
3
- Information Systems & e-Business Management, 2023, v. 21, n. 3, p. 699, doi. 10.1007/s10257-023-00646-y
- Kamil, Yasmin;
- Lund, Sofia;
- Islam, M Sirajul
- Article
4
- Information Systems & e-Business Management, 2023, v. 21, n. 1, p. 123, doi. 10.1007/s10257-022-00575-2
- Alahmari, Saad;
- Renaud, Karen;
- Omoronyia, Inah
- Article
5
- Information Systems & e-Business Management, 2020, v. 18, n. 2, p. 157, doi. 10.1007/s10257-020-00470-8
- Diéguez, Mauricio;
- Bustos, Jaime;
- Cares, Carlos
- Article
6
- 2004
- Dale, Virginia;
- Bartell, Steve;
- Brothers, Robin;
- Sorensen, John
- Editorial
7
- Deakin Law Review, 2004, v. 9, n. 2, p. 295, doi. 10.21153/dlr2004vol9no2art244
- Article
8
- Croatian Geographical / Hrvatski Geografski Glasnik, 2008, v. 70, n. 1, p. 25
- Article
9
- Society, 2000, v. 37, n. 6, p. 28, doi. 10.1007/s12115-000-1019-9
- Article
10
- Social Forces, 1930, v. 9, n. 1, p. 104, doi. 10.2307/2570093
- Article
11
- Practical Assessment, Research & Evaluation, 2022, v. 27, p. 1
- Gorney, Kylie;
- Wollack, James A.
- Article
12
- Round Table, 2022, v. 111, n. 6, p. 732, doi. 10.1080/00358533.2022.2147266
- Di Bonaventura-Altuve, Leonardo
- Article
13
- Round Table, 2022, v. 111, n. 6, p. 724, doi. 10.1080/00358533.2022.2147264
- Article
14
- Round Table, 2022, v. 111, n. 6, p. 730, doi. 10.1080/00358533.2022.2146406
- Article
15
- Round Table, 2022, v. 111, n. 6, p. 728, doi. 10.1080/00358533.2022.2146399
- Article
16
- Round Table, 2021, v. 110, n. 5, p. 622, doi. 10.1080/00358533.2021.1984000
- Article
17
- Round Table, 2007, v. 96, n. 391, p. 415, doi. 10.1080/00358530701564977
- Article
18
- Journal of Language & Politics, 2021, v. 20, n. 3, p. 407, doi. 10.1075/jlp.19060.lah
- Lähteenmäki, Liisa;
- Alvesalo, Anne
- Article
20
- Contexto Internacional, 2020, v. 42, n. 3, p. 569, doi. 10.1590/S0102-8529.2019420300003
- Article
21
- Qualitative Inquiry, 2009, v. 15, n. 10, p. 1552, doi. 10.1177/1077800409343069
- Goldstein, Tara;
- Wickett, Jocelyn
- Article
22
- Political Quarterly, 1987, v. 58, n. 1, p. 62, doi. 10.1111/j.1467-923X.1987.tb02575.x
- Hartley, Keith;
- Hussain, Farooq;
- Smith, Ron
- Article
23
- Political Quarterly, 1984, v. 55, n. 4, p. 438, doi. 10.1111/j.1467-923X.1984.tb02621.x
- Article
24
- Computing & Control Engineering, 2006, v. 17, n. 2, p. 12, doi. 10.1049/cce:20060201
- Article
25
- Professional Safety, 2013, v. 58, n. 11, p. 52
- Article
26
- Professional Safety, 2013, v. 58, n. 4, p. 62
- Article
27
- Journal of Correctional Education, 1996, v. 47, n. 2, p. 64
- Article
28
- Journal of Forensic Psychiatry & Psychology, 2022, v. 33, n. 2, p. 200, doi. 10.1080/14789949.2022.2044068
- Article
29
- Journal of Forensic Psychiatry & Psychology, 2017, v. 28, n. 5, p. 674, doi. 10.1080/14789949.2017.1313300
- Roy, Chloe;
- Thomson, Lindsay
- Article
30
- Empirica, 2006, v. 33, n. 5, p. 351, doi. 10.1007/s10663-006-9021-0
- Lefèbvre, Mathieu;
- Pestieau, Pierre
- Article
31
- Journal of Prosthodontics (John Wiley & Sons, Inc.), 2013, v. 22, n. 4, p. 338, doi. 10.1111/j.1532-849X.2012.00945.x
- Goiato, Marcelo Coelho;
- dos Santos, Daniela Micheline;
- Moreno, Amália;
- Filié Haddad, Marcela;
- Turcio, Karina Helga Leal
- Article
32
- Distributed Computing, 2022, v. 35, n. 6, p. 477, doi. 10.1007/s00446-022-00421-1
- Kuznetsov, Petr;
- Tonkikh, Andrei
- Article
33
- Distributed Computing, 2018, v. 31, n. 6, p. 489, doi. 10.1007/s00446-017-0315-1
- Alistarh, Dan;
- Aspnes, James;
- King, Valerie;
- Saia, Jared
- Article
34
- Distributed Computing, 2018, v. 31, n. 6, p. 419, doi. 10.1007/s00446-017-0313-3
- King, Valerie;
- Pettie, Seth;
- Saia, Jared;
- Young, Maxwell
- Article
35
- Journal of Advanced Manufacturing Systems, 2008, v. 7, n. 2, p. 303, doi. 10.1142/S0219686708001371
- Article
36
- FinanzRundschau, 2024, v. 106, n. 4, p. 196, doi. 10.9785/fr-2024-1060409
- Article
37
- Cihan University-Erbil Scientific Journal, 2022, v. 6, n. 1, p. 47, doi. 10.24086/cuesj.v6n1y2022.pp47-52
- Aziz, Israa T.;
- Abdulqadder, Ihsan H.;
- Jawad, Thakwan A.
- Article
38
- Journal of Application Business & Management / Jurnal Aplikasi Bisnis dan Manajemen, 2023, v. 9, n. 2, p. 604, doi. 10.17358/jabm.9.2.604
- Anwar, Ranti Fitri;
- Mulyati, Heti;
- Rahmawati, Wita Juwita
- Article
39
- Globus - An International Journal of Management & IT, 2022, v. 13, n. 2, p. 12, doi. 10.46360/globus.mgt.120221003
- Article
40
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 458, doi. 10.1049/ise2.12109
- Shiraya, Takuro;
- Takeuchi, Nobuyuki;
- Sakamoto, Kosei;
- Isobe, Takanori
- Article
41
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 5, p. 390, doi. 10.1049/ise2.12065
- Shen, Xuan;
- Liu, Guoqiang;
- Wang, Xiaofeng;
- Sun, Bing;
- He, Jun
- Article
42
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 262, doi. 10.1049/ise2.12058
- Guo, Chun;
- Iwata, Tetsu;
- Minematsu, Kazuhiko
- Article
43
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 253, doi. 10.1049/ise2.12056
- Article
44
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 2, p. 97, doi. 10.1049/ise2.12047
- Nian, Jiawei;
- Wang, Ping;
- Gao, Haichang;
- Guo, Xiaoyan
- Article
45
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 1, doi. 10.1049/ise2.12040
- Yuan, Quan;
- Tibouchi, Mehdi;
- Abe, Masayuki
- Article
46
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 4, p. 220, doi. 10.1049/iet-ifs.2016.0218
- Goutham Reddy, Alavalapati;
- Yoon, Eun‐Jun;
- Yoo, Kee‐Young
- Article
47
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 318, doi. 10.1049/iet-ifs.2012.0253
- Article
48
- IET Image Processing (Wiley-Blackwell), 2021, v. 15, n. 14, p. 3411, doi. 10.1049/ipr2.12379
- Wang, Qi;
- Liu, Bo;
- Lin, Jianzhe
- Article
49
- Projustice, 2023, p. 1
- Gdovin, npor. JUDr. Jozef
- Article
50
- Projustice, 2022, p. 1
- Article