Works matching DE "ELECTRONIC information resource security"
Results: 32
FORMING THE AWARENESS OF EMPLOYEES IN THE FIELD OF INFORMATION SECURITY.
- Published in:
- Journal of Positive Management, 2017, v. 8, n. 1, p. 78, doi. 10.12775/JPM.2017.006
- By:
- Publication type:
- Article
ELEKTRONINĖS INFORMACIJOS SAUGOS REGLAMENTAVIMAS LIETUVOJE IR RUSIJOJE: LYGINAMIEJI ASPEKTAI.
- Published in:
- Social Technologies / Socialines Technologijos, 2012, v. 2, n. 2, p. 441
- By:
- Publication type:
- Article
Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks.
- Published in:
- Journal of Information Assurance & Security, 2015, v. 10, n. 5, p. 218
- By:
- Publication type:
- Article
Issues of Digital Data Security in Library Environment.
- Published in:
- International Journal of Information Dissemination & Technology, 2011, v. 1, n. 4, p. 244
- By:
- Publication type:
- Article
Guest Editorial.
- Published in:
- Journal of Multimedia, 2012, v. 7, n. 4, p. 277, doi. 10.4304/jmm.7.4.277-278
- By:
- Publication type:
- Article
Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP.
- Published in:
- Natural Computing, 2014, v. 13, n. 4, p. 453, doi. 10.1007/s11047-014-9453-6
- By:
- Publication type:
- Article
Structuration Theory and Strategic Alignment in Information Security Management: Introduction of a Comprehensive Research Approach and Program.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2017, v. 16, n. 1, p. 5
- By:
- Publication type:
- Article
Methodology of complex security for the person and social groups against the negative information-psychological influence.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 94, doi. 10.18372/2225-5036.22.10460
- By:
- Publication type:
- Article
General solving linear Diophantine equations based on a modular transformation for risk assessment in information security.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 75, doi. 10.18372/2225-5036.22.10457
- By:
- Publication type:
- Article
Developing a model of information security risk assessment based on colored Petri net.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 293, doi. 10.18372/2225-5036.20.7558
- By:
- Publication type:
- Article
CURRENT SITUATION ANALYSIS OF INFORMATION SECURITY LEVEL IN MUNICIPALITIES.
- Published in:
- Journal of Information System Security, 2018, v. 14, n. 1, p. 3
- By:
- Publication type:
- Article
Electronic Resources Security: A look at Unauthorized Users.
- Published in:
- Code4Lib Journal, 2010, n. 12, p. 1
- By:
- Publication type:
- Article
Document Retention in an E-world.
- Published in:
- Internal Auditor, 2010, v. 67, n. 2, p. 52
- By:
- Publication type:
- Article
INFORMATION SECURITY PROBLEMS OF EDUCATIONAL ELECTRONIC INFORMATION RESOURCES.
- Published in:
- Scientific Bulletin of National Mining University, 2012, n. 5, p. 101
- By:
- Publication type:
- Article
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
- Published in:
- Decision Sciences, 2019, v. 50, n. 2, p. 245, doi. 10.1111/deci.12328
- By:
- Publication type:
- Article
Information Security Issues in a Digital Library Environment: A Literature Review.
- Published in:
- Information World / Bilgi Dünyası, 2012, v. 13, n. 1, p. 117, doi. 10.15612/bd.2012.171
- By:
- Publication type:
- Article
Incompatibility of the Digital Economy Act 2010 subscriber appeal process provisions with Article 6 of the ECHR.
- Published in:
- International Review of Law, Computers & Technology, 2014, v. 28, n. 1, p. 81, doi. 10.1080/13600869.2013.869912
- By:
- Publication type:
- Article
INFORMATION OVERLOAD: WHY OMNIPRESENT TECHNOLOGY AND THE RISE OF BIG DATA SHOULDN'T SPELL THE END FOR PRIVACY AS WE KNOW IT.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 31, n. 3, p. 925
- By:
- Publication type:
- Article
Improved Biba model based on trusted computing.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2793, doi. 10.1002/sec.1201
- By:
- Publication type:
- Article
Security in a completely interconnected world.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Protecting Australian Cyberspace: Are our International Lawyers Ready?
- Published in:
- Australian International Law Journal, 2012, v. 19, n. 1, p. 49
- By:
- Publication type:
- Article
EVALUATION OF HYBRID FACE AND VOICE RECOGNITION SYSTEMS FOR BIOMETRIC IDENTIFICATION IN AREAS REQUIRING HIGH SECURITY.
- Published in:
- i-Manager's Journal of Pattern Recognition, 2017, v. 4, n. 3, p. 9, doi. 10.26634/jpr.4.3.13885
- By:
- Publication type:
- Article
Information Security Measures of Libraries of Central Universities of Delhi : A Study.
- Published in:
- DESIDOC Journal of Library & Information Technology, 2018, v. 38, n. 2, p. 102, doi. 10.14429/djlit.38.2.11879
- By:
- Publication type:
- Article
The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack.
- Published in:
- IETE Journal of Research, 2012, v. 58, n. 5, p. 398, doi. 10.4103/0377-2063.104158
- By:
- Publication type:
- Article
SHORT RUNS.
- Published in:
- Quality Progress, 2016, v. 49, n. 10, p. 13
- Publication type:
- Article
THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY.
- Published in:
- Scientific Research & Education in the Air Force - AFASES, 2017, v. 2, p. 57, doi. 10.19062/2247-3173.2017.19.2.8
- By:
- Publication type:
- Article
Protection of defensive computer network systems.
- Published in:
- AARMS: Academic & Applied Research in Military Science, 2011, v. 10, n. 2, p. 263
- By:
- Publication type:
- Article
PRIVATE LIFE SAFETY PROVISION IN DIGITAL AGE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 3, p. 77
- By:
- Publication type:
- Article
An Analysis of Anomaly Detection in Network Traffic and Role of Wavelets.
- Published in:
- IUP Journal of Information Technology, 2010, v. 6, n. 1, p. 43
- By:
- Publication type:
- Article
Overview of Information Security Using Genetic Algorithm and Chaos.
- Published in:
- Information Security Journal: A Global Perspective, 2009, v. 18, n. 6, p. 306, doi. 10.1080/19393550903327558
- By:
- Publication type:
- Article
Technological competence and the duty to safeguard confidential information in the USA.
- Published in:
- Legal Ethics, 2017, v. 20, n. 2, p. 268, doi. 10.1080/1460728x.2017.1405781
- By:
- Publication type:
- Article
Survey on Password Quality and Confidentiality.
- Published in:
- Automatika: Journal for Control, Measurement, Electronics, Computing & Communications, 2015, v. 56, n. 1, p. 69, doi. 10.7305/automatika.2015.04.587
- By:
- Publication type:
- Article