Works matching DE "SECURITY measures of computer networks in business enterprises"
Results: 26
How Can Threat Intelligence Help the Battle Against Cyber Attacks.
- Published in:
- Financial Executive, 2014, v. 30, n. 4, p. 93
- By:
- Publication type:
- Article
How to Finance IT And Handle Change.
- Published in:
- Financial Executive, 2007, v. 23, n. 2, p. 58
- By:
- Publication type:
- Article
From Ancient Fortress to Modern Cyberdefense.
- Published in:
- IT Professional, 2009, v. 11, n. 3, p. 22, doi. 10.1109/MITP.2009.48
- By:
- Publication type:
- Article
Executive Overview.
- Published in:
- 1989
- Publication type:
- Abstract
IS THERE A DOCTOR IN THE HOUSE?
- Published in:
- Management Review, 1991, v. 80, n. 7, p. 5
- By:
- Publication type:
- Article
Protecting EDP systems from fifth-column attacks.
- Published in:
- Management Review, 1972, v. 61, n. 10, p. 51
- By:
- Publication type:
- Article
THE 17<sup>TH</sup> GLOBAL INFORMATION SECURITY SURVEY.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 1, p. 79
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
BALANCING THE BREACH: DATA PRIVACY LAWS IN THE WAKE OF THE NSA REVELATIONS.
- Published in:
- Houston Journal of International Law, 2015, v. 37, n. 2, p. 543
- By:
- Publication type:
- Article
PRIVACY Risk Management.
- Published in:
- Internal Auditor, 2014, v. 71, n. 5, p. 37
- By:
- Publication type:
- Article
SAFEGUARDING CUSTOMER DATA.
- Published in:
- Internal Auditor, 2014, v. 71, n. 5, p. 22
- By:
- Publication type:
- Article
EMAIL INTEGRITY FALLS SHORT.
- Published in:
- Internal Auditor, 2014, v. 71, n. 5, p. 17
- By:
- Publication type:
- Article
SECURITY BREACHES WIDESPREAD.
- Published in:
- Internal Auditor, 2014, v. 71, n. 5, p. 13
- By:
- Publication type:
- Article
Checklists: Prevent white-collar computer crime.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2012, v. 23, n. 5, p. 49, doi. 10.1002/jcaf.21783
- By:
- Publication type:
- Article
Security of a single-state semi-quantum key distribution protocol.
- Published in:
- Quantum Information Processing, 2018, v. 17, n. 6, p. 1, doi. 10.1007/s11128-018-1904-z
- By:
- Publication type:
- Article
SIEM: Hacia una nueva estrategia de ciberseguridad.
- Published in:
- IEEM Revista de Negocios, 2017, v. 20, n. 6, p. 64
- By:
- Publication type:
- Article
Is Security Realistic In Cloud Computing?
- Published in:
- Journal of International Technology & Information Management, 2013, v. 22, n. 4, p. 47, doi. 10.58729/1941-6679.1020
- By:
- Publication type:
- Article
Supporting Business Privacy Protection in Wireless Sensor Networks.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/7638149
- By:
- Publication type:
- Article
Detecting and Resolving Firewall Policy Anomalies.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 318, doi. 10.1109/TDSC.2012.20
- By:
- Publication type:
- Article
Building an Enterprise SOC and Risk Management Function.
- Published in:
- 2021
- By:
- Publication type:
- Case Study
A Study of Performative Hactivist Subcultures and Threats to Businesses.
- Published in:
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 187, doi. 10.1080/19393555.2013.852637
- By:
- Publication type:
- Article
C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
A Markov Decision Process Model for High Interaction Honeypots.
- Published in:
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 159, doi. 10.1080/19393555.2013.828802
- By:
- Publication type:
- Article
Managing Security: The Security Content Automation Protocol.
- Published in:
- IT Professional, 2011, v. 13, n. 1, p. 9, doi. 10.1109/MITP.2011.11
- By:
- Publication type:
- Article
IT Professional in 2011.
- Published in:
- IT Professional, 2011, v. 13, n. 1, p. 4, doi. 10.1109/MITP.2011.10
- By:
- Publication type:
- Article
IMPOSSIBLE MATH: THE NEED FOR GOVERNMENT-BACKED CYBER INSURANCE.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2023, v. 58, n. 3, p. 443
- By:
- Publication type:
- Article