Works matching DE "COMPUTER security management"
1
- ISSA Journal, 2018, v. 16, n. 4, p. 8
- Article
2
- Revista Derecho del Estado, 2009, n. 23, p. 37
- Article
3
- International Transactions on Electrical Energy Systems, 2022, p. 1, doi. 10.1155/2022/3175786
- Article
4
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- Prabha, Rama;
- Jayanthi R., K. P.
- Article
5
- Financial Executive, 2005, v. 21, n. 8, p. 12
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
6
- Financial Executive, 2005, v. 21, n. 7, p. 45
- Article
7
- Financial Executive, 2003, v. 19, n. 9, p. 51
- Article
8
- Financial Executive, 2003, v. 19, n. 9, p. 49
- Article
9
- Financial Executive, 2003, v. 19, n. 9, p. 11
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
10
- Revista Logos Ciencia & Tecnologia, 2024, v. 16, n. 3, p. 62, doi. 10.22335/rlct.v16i3.1967
- Unás Gómez, José Luis;
- Estrada Esponda, Royer David;
- Toro Pareja, Luis Germán
- Article
11
- Information Systems Frontiers, 2023, v. 25, n. 6, p. 2475, doi. 10.1007/s10796-022-10367-1
- Yoo, Chul Woo;
- Hur, Inkyoung;
- Goo, Jahyun
- Article
12
- Trends & Issues in Crime & Criminal Justice, 2010, n. 400, p. 1
- Article
13
- Journal of International Affairs, 2016, v. 70, n. 1, p. 161
- Article
14
- Internal Auditor, 2007, v. 64, n. 5, p. 66
- Article
15
- Internal Auditor, 2007, v. 64, n. 5, p. 15
- Article
16
- Journal of Computer Networks & Communications, 2022, p. 1, doi. 10.1155/2022/9049420
- Article
17
- Telecommunication Systems, 2009, v. 42, n. 3/4, p. 273, doi. 10.1007/s11235-009-9186-5
- Atkinson, Randall;
- Bhatti, Saleem;
- Hailes, Stephen
- Article
18
- 2023
- and Communication Networks, Security
- Correction Notice
19
- International Journal of InformaticsTechnologies, 2010, v. 3, n. 2, p. 1
- Can, Özgü;
- Ünalir, Murat Osman
- Article
20
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/3323547
- Article
21
- Surveillance & Society, 2020, v. 18, n. 1, p. 104, doi. 10.24908/ss.v18i1.10419
- Krueger, Brian S.;
- Best, Samuel J.;
- Johnson, Kristin
- Article
22
- Defense Acquisition, 2023, v. 52, n. 5, p. 34
- BYCHKOV, DAVID;
- JACOBSON, AARON
- Article
23
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- Nagisetty, Ramune;
- Booth, Cory
- Article
24
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- Edwards, Jonathan;
- Grewal, Ken;
- LeMay, Michael;
- Robinson, Scott H.;
- Sahita, Ravi;
- Woodward, Carl
- Article
25
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- Bhargav-Spantzel, Abhilasha
- Article
26
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- Dmitrienko, Alexandra;
- Liebchen, Christopher;
- Rossow, Christian;
- Sadeghi, Ahmad-Reza
- Article
27
- Intel Technology Journal, 2014, v. 18, n. 4, p. 120
- Smith, Ned M.;
- Sheller, Micah;
- Heldt-Sheller, Nathan
- Article
28
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- Whitelam, Cameron;
- Bourlai, Thirimachos
- Article
29
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- Article
30
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- Cornelius, Cory;
- Gutierrez, Christopher N.
- Article
31
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- Martin, Jason;
- Rajan, Anand;
- Steigerwald, Bob
- Article
32
- Energies (19961073), 2020, v. 13, n. 6, p. 1473, doi. 10.3390/en13061473
- Yigitcanlar, Tan;
- Desouza, Kevin C.;
- Butler, Luke;
- Roozkhosh, Farnoosh
- Article
33
- MIS Quarterly, 2014, v. 38, n. 2, p. 451
- Juhee Kwon;
- Johnson, M. Eric
- Article
34
- IEEE Software, 2003, v. 20, n. 1, p. 50, doi. 10.1109/MS.2003.1159029
- Brykczynski, Bill;
- Small, Robert A.
- Article
35
- International Journal of Recent Research Aspects, 2016, v. 3, n. 2, p. 37
- Panghal, Jyoti;
- Verma, Navneet
- Article
36
- International Journal of Recent Research Aspects, 2016, v. 3, n. 2, p. 1
- Arora, Mahak;
- Sharma, Kamal Kumar;
- Chauhan, Sharad
- Article
38
- International Journal of Electronics & Telecommunications, 2022, v. 68, n. 3, p. 475, doi. 10.24425/ijet.2022.141263
- Article
39
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 64, doi. 10.1007/s11036-013-0462-y
- Article
40
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 153, doi. 10.14569/ijacsa.2024.0150617
- Article
41
- Strategic Studies Quarterly, 2011, v. 5, n. 4, p. 18
- Article
42
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 180, doi. 10.1080/19393555.2013.830347
- Article
43
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 1, p. 46, doi. 10.1080/19393555.2013.788685
- Deng, Lunzhi;
- Liu, Chenglian;
- Wang, Xiangbin
- Article
44
- Information Security Journal: A Global Perspective, 2009, v. 18, n. 6, p. 273, doi. 10.1080/19393550903200474
- Article
45
- Information Security Journal: A Global Perspective, 2009, v. 18, n. 6, p. 297, doi. 10.1080/19393550903324936
- Article
46
- Strategic Finance, 2005, v. 86, n. 11, p. 55
- Article
47
- Strategic Finance, 2005, v. 86, n. 7, p. 49
- Article
48
- Strategic Finance, 2002, v. 84, n. 3, p. 32
- Article
50
- Journal of Network & Systems Management, 2012, v. 20, n. 4, p. 513, doi. 10.1007/s10922-012-9244-2
- Arias-Cabarcos, Patricia;
- Almenárez-Mendoza, Florina;
- Marín-López, Andrés;
- Díaz-Sánchez, Daniel;
- Sánchez-Guerrero, Rosa
- Article