Search Results - "information security"
Suggested Topics within your search.
Suggested Topics within your search.
- Data and Information Security 41
- Data protection 41
- Computer security 22
- Computer networks 13
- Cryptography 13
- Cryptology 13
- Data encryption (Computer science) 13
- Application software 10
- Computer Communication Networks 10
- Computer and Information Systems Applications 10
- Computer science 10
- Artificial intelligence 9
- Artificial Intelligence 7
- Software engineering 7
- History of engineering & technology 6
- Network security 6
- Software Engineering 6
- Computer networks 5
- Computers 5
- Information technology: general issues 5
- Mobile and Network Security 5
- Security measures 5
- Computer networking & communications 4
- Computer vision 4
- Data mining 4
- Games development & programming 4
- Information retrieval 4
- Information technology 4
- Information theory 4
- Law and legislation 4
-
1
Managing Risk and Information Security Protect to Enable /
Published 2013Subjects: “…Data and Information Security.…”
Link to Metadata
Electronic eBook -
2
Managing Risk and Information Security Protect to Enable /
Published 2016Subjects: “…Data and Information Security.…”
Link to Metadata
Electronic eBook -
3
Information Security Governance Simplified From the Boardroom to the Keyboard
Published 2011DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
4
Advances in Information Security and Privacy
Published 2022Subjects: “…information security…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
5
Information Security Governance Simplified From the Boardroom to the Keyboard
Published 2011OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
6
Cryptography and Its Applications in Information Security
Published 2022DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
7
The InfoSec Handbook: An Introduction to Information Security
Published 2014DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
8
Symmetry-Adapted Machine Learning for Information Security
Published 2020DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
9
-
10
-
11
-
12
-
13
-
14
-
15
Managing Risk and Information Security: Protect to Enable (First Edition)
Published 2013DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
16
Managing Risk and Information Security: Protect to Enable (Second Edition)
Published 2016DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
17
Managing Risk and Information Security: Protect to Enable (First Edition)
Published 2013DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
18
Managing Risk and Information Security: Protect to Enable (Second Edition)
Published 2016DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
19
-
20
Managing Risk and Information Security: Protect to Enable (Second Edition)
Published 2016OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter