Works matching DE "SECURITY measures of computer networks in business enterprises"
1
- Financial Executive, 2014, v. 30, n. 4, p. 93
- Article
2
- Financial Executive, 2007, v. 23, n. 2, p. 58
- Article
3
- Houston Journal of International Law, 2015, v. 37, n. 2, p. 543
- Article
4
- IEEM Revista de Negocios, 2017, v. 20, n. 6, p. 64
- Article
5
- Internal Auditor, 2014, v. 71, n. 5, p. 37
- Chaudhary, Raj;
- Lucas, Michael
- Article
6
- Internal Auditor, 2014, v. 71, n. 5, p. 13
- Article
7
- Internal Auditor, 2014, v. 71, n. 5, p. 22
- Article
8
- Internal Auditor, 2014, v. 71, n. 5, p. 17
- Article
9
- Quantum Information Processing, 2018, v. 17, n. 6, p. 1, doi. 10.1007/s11128-018-1904-z
- Zhang, Wei;
- Qiu, Daowen;
- Mateus, Paulo
- Article
10
- Journal of Corporate Accounting & Finance (Wiley), 2012, v. 23, n. 5, p. 49, doi. 10.1002/jcaf.21783
- McGee, Jo Ann;
- Byington, J. Ralph
- Article
11
- Tort Trial & Insurance Practice Law Journal, 2023, v. 58, n. 3, p. 443
- Article
13
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 187, doi. 10.1080/19393555.2013.852637
- Workman, Michael;
- Phelps, DanielC.;
- Hare, RobertC.
- Article
15
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 4, p. 159, doi. 10.1080/19393555.2013.828802
- Hayatle, Osama;
- Otrok, Hadi;
- Youssef, Amr
- Article
16
- Management Review, 1991, v. 80, n. 7, p. 5
- Article
17
- Management Review, 1972, v. 61, n. 10, p. 51
- Article
18
- Journal of Information System Security, 2014, v. 10, n. 1, p. 79
- Article
19
- Journal of Information System Security, 2014, v. 10, n. 1, p. 1
- Article
20
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/7638149
- Feng, Nan;
- Hao, Zhiqi;
- Yang, Sibo;
- Wu, Harris
- Article
21
- IT Professional, 2011, v. 13, n. 1, p. 4, doi. 10.1109/MITP.2011.10
- Article
22
- IT Professional, 2011, v. 13, n. 1, p. 9, doi. 10.1109/MITP.2011.11
- Radack, Shirley;
- Kuhn, Rick
- Article
23
- IT Professional, 2009, v. 11, n. 3, p. 22, doi. 10.1109/MITP.2009.48
- Liu, Simon;
- Ormaner, Jerry
- Article
24
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 318, doi. 10.1109/TDSC.2012.20
- Hu, Hongxin;
- Ahn, Gail-Joon;
- Kulkarni, Ketan
- Article
26
- Journal of International Technology & Information Management, 2013, v. 22, n. 4, p. 47, doi. 10.58729/1941-6679.1020
- Article