Works matching DE "INFORMATION technology security"


Results: 4656
    1
    2
    3
    4
    5
    6
    7
    8
    9

    INTRODUCTION TO THIS ISSUE.

    Published in:
    Career Planning & Adult Development Journal, 2017, v. 33, n. 1, p. 5
    By:
    • Venable, Melissa A.
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16
    17
    18

    cio central.

    Published in:
    Government Technology, 2025, v. 38, n. 1, p. 48
    Publication type:
    Article
    19

    cio central.

    Published in:
    Government Technology, 2024, v. 37, n. 7, p. 44
    Publication type:
    Article
    20

    cio central.

    Published in:
    Government Technology, 2024, v. 37, n. 5, p. 42
    Publication type:
    Article
    21

    cio central.

    Published in:
    Government Technology, 2024, v. 37, n. 4, p. 41
    Publication type:
    Article
    22

    23 Years of Top 25.

    Published in:
    Government Technology, 2024, v. 37, n. 4, p. 5
    By:
    • Knell, Noelle
    Publication type:
    Article
    23

    Changing of the Guard.

    Published in:
    Government Technology, 2023, v. 36, n. 8, p. 18
    By:
    • KNELL, NOELLE
    Publication type:
    Article
    24

    cio central.

    Published in:
    Government Technology, 2023, v. 36, n. 2, p. 42
    Publication type:
    Article
    25

    A Fresh Approach.

    Published in:
    Government Technology, 2023, v. 36, n. 1, p. 50
    By:
    • Lohrmann, Dan
    Publication type:
    Article
    26
    27
    28
    29

    ON THE MOVE.

    Published in:
    Government Technology, 2020, v. 33, n. 9, p. 44
    Publication type:
    Article
    30

    Cio central.

    Published in:
    Government Technology, 2019, v. 32, n. 7, p. 52
    Publication type:
    Article
    32

    STATES TACKLE PRIVACY.

    Published in:
    Government Technology, 2019, v. 32, n. 5, p. 10
    By:
    • Miller, Ben
    Publication type:
    Article
    33
    34
    35
    36
    37
    38
    39
    40

    Erik Avakian.

    Published in:
    2014
    By:
    • Pittman, Elaine
    Publication type:
    Interview
    41
    42

    Tightening the Net.

    Published in:
    Government Technology, 2010, v. 23, n. 6, p. 20
    By:
    • COLLINS, HILTON
    Publication type:
    Article
    43

    Dan Lohrmann.

    Published in:
    Government Technology, 2009, v. 22, n. 3, p. 20
    By:
    • Nwcombe, Tod
    Publication type:
    Article
    44

    HOW SAFE IS YOUR DATA?

    Published in:
    Government Technology, 2008, v. 21, n. 4, p. 26
    By:
    • Towns, Steve
    Publication type:
    Article
    45

    Data Defense.

    Published in:
    Government Technology, 2008, v. 21, n. 4, p. 44
    By:
    • Powers, Vicki
    Publication type:
    Article
    46
    47
    48
    49
    50