Works matching DE "INFORMATION technology security"


Results: 4654
    1
    2
    3
    4
    5
    6
    7

    INTRODUCTION TO THIS ISSUE.

    Published in:
    Career Planning & Adult Development Journal, 2017, v. 33, n. 1, p. 5
    By:
    • Venable, Melissa A.
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14
    15
    16

    cio central.

    Published in:
    Government Technology, 2025, v. 38, n. 1, p. 48
    Publication type:
    Article
    17

    cio central.

    Published in:
    Government Technology, 2024, v. 37, n. 7, p. 44
    Publication type:
    Article
    18

    cio central.

    Published in:
    Government Technology, 2024, v. 37, n. 5, p. 42
    Publication type:
    Article
    19

    cio central.

    Published in:
    Government Technology, 2024, v. 37, n. 4, p. 41
    Publication type:
    Article
    20

    23 Years of Top 25.

    Published in:
    Government Technology, 2024, v. 37, n. 4, p. 5
    By:
    • Knell, Noelle
    Publication type:
    Article
    21

    Changing of the Guard.

    Published in:
    Government Technology, 2023, v. 36, n. 8, p. 18
    By:
    • KNELL, NOELLE
    Publication type:
    Article
    22

    cio central.

    Published in:
    Government Technology, 2023, v. 36, n. 2, p. 42
    Publication type:
    Article
    23

    A Fresh Approach.

    Published in:
    Government Technology, 2023, v. 36, n. 1, p. 50
    By:
    • Lohrmann, Dan
    Publication type:
    Article
    24
    25
    26
    27

    ON THE MOVE.

    Published in:
    Government Technology, 2020, v. 33, n. 9, p. 44
    Publication type:
    Article
    28

    Cio central.

    Published in:
    Government Technology, 2019, v. 32, n. 7, p. 52
    Publication type:
    Article
    30

    STATES TACKLE PRIVACY.

    Published in:
    Government Technology, 2019, v. 32, n. 5, p. 10
    By:
    • Miller, Ben
    Publication type:
    Article
    31
    32
    33
    34
    35
    36
    37
    38

    Erik Avakian.

    Published in:
    2014
    By:
    • Pittman, Elaine
    Publication type:
    Interview
    39
    40

    Tightening the Net.

    Published in:
    Government Technology, 2010, v. 23, n. 6, p. 20
    By:
    • COLLINS, HILTON
    Publication type:
    Article
    41

    Dan Lohrmann.

    Published in:
    Government Technology, 2009, v. 22, n. 3, p. 20
    By:
    • Nwcombe, Tod
    Publication type:
    Article
    42

    HOW SAFE IS YOUR DATA?

    Published in:
    Government Technology, 2008, v. 21, n. 4, p. 26
    By:
    • Towns, Steve
    Publication type:
    Article
    43

    Data Defense.

    Published in:
    Government Technology, 2008, v. 21, n. 4, p. 44
    By:
    • Powers, Vicki
    Publication type:
    Article
    44
    45
    46
    47
    48
    49
    50