Works matching DE "BUSINESS enterprise security"


Results: 78
    1
    2
    3

    Securing BYOD.

    Published in:
    IT Professional, 2014, v. 16, n. 5, p. 9, doi. 10.1109/MITP.2014.76
    By:
    • Chang, J. Morris;
    • Ho, Pao-Chung;
    • Chang, Teng-Chang
    Publication type:
    Article
    4
    5
    6
    7
    8
    9

    A Complicated Intersection.

    Published in:
    Brookings Review, 2002, v. 20, n. 3, p. 20, doi. 10.2307/20081048
    By:
    • Litan, Robert;
    • Orszag, Peter
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22

    Comment.

    Published in:
    Technometrics, 2010, v. 52, n. 3, p. 283, doi. 10.1198/TECH.2010.09174
    By:
    • Tsung, F.
    Publication type:
    Article
    23
    24

    Infosec Standards.

    Published in:
    ISSA Journal, 2018, v. 16, n. 7, p. 7
    By:
    • Anderson, Mark
    Publication type:
    Article
    25

    Fine, I'll Comply.

    Published in:
    ISSA Journal, 2018, v. 16, n. 7, p. 6
    By:
    • Williams, Branden R.
    Publication type:
    Article
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44

    Let's get the facts!

    Published in:
    Management Review, 1977, v. 66, n. 6, p. 2
    By:
    • Hayes, James L.
    Publication type:
    Article
    45
    46
    47
    48
    49
    50