Academic literature on the topic 'ICT security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ICT security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ICT security"
Dave, Mayur, and Anand R. Prasad. "ICT Security and Security Testing Aspects." Journal of ICT Standardization 1, no. 2 (2013): 175–86. http://dx.doi.org/10.13052/jicts2245-800x.12a4.
Full textPasquinucci, Andrea. "Economics of ICT security." Computer Fraud & Security 2008, no. 8 (2008): 4–6. http://dx.doi.org/10.1016/s1361-3723(08)70123-4.
Full textKathane, Rajesh. "Information (ICT) security and Libraries." IP Indian Journal of Library Science and Information Technology 5, no. 1 (2020): 43–45. http://dx.doi.org/10.18231/j.ijlsit.2020.009.
Full textSmolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.
Full textHills, Alice. "IV. ICT for Community Security." Whitehall Papers 91, no. 1 (2017): 70–83. http://dx.doi.org/10.1080/02681307.2017.1462555.
Full textBostan, Atila. "Impact of education on security practices in ICT." Tehnicki vjesnik - Technical Gazette 22, no. 1 (2015): 161–68. http://dx.doi.org/10.17559/tv-20140403122930.
Full textMeghisan-Toma, Georgeta-Madalina, and Vasile Cosmin Nicula. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context." Proceedings of the International Conference on Business Excellence 14, no. 1 (2020): 362–70. http://dx.doi.org/10.2478/picbe-2020-0035.
Full textLAVINA, TATYANA A., and LARISA A. ILINA. "ICT COMPETENCE OF FUTURE INFORMATION SECURITY SPECIALISTS." Cherepovets State University Bulletin 6, no. 105 (2021): 112–28. http://dx.doi.org/10.23859/1994-0637-2021-6-105-10.
Full textAkman, İbrahim, and Atila Bostan. "ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY." PEOPLE: International Journal of Social Sciences 3, no. 3 (2018): 1046–63. http://dx.doi.org/10.20319/pijss.2018.33.10461063.
Full textJacob, Luis, and Ricardo Pocinho. "ICT, Senior universities and digital security." Geopolitical, Social Security and Freedom Journal 2, no. 1 (2019): 37–45. http://dx.doi.org/10.2478/gssfj-2019-0004.
Full textDissertations / Theses on the topic "ICT security"
Pandey, Bimal Raj. "Indicators for ICT security incident management." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20665.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textKvastad, Johan. "ICT Security of an Electronic Health Record System: an Empirical Investigation : An in depth investigation of ICT security in a modern healthcare system." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194121.
Full textMatusík, Jan. "Zavedení managementu bezpečnosti ICT na základní škole." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224834.
Full textNäckros, Kjell. "Visualising security through computer games : investigating game-based instruction in ICT security : an experimental approach /." Kista : Department of Computer and Systems Sciences, Stockholm University : Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-533.
Full textSchoffer, Pavel. "Analýza informačního systému ISAD a návrh jeho změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241506.
Full textTarimo, Charles N. "ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354.
Full textKosek, Jindřich. "Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224444.
Full textSulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.
Full textBooks on the topic "ICT security"
De Capitani di Vimercati, Sabrina, and Fabio Martinelli, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.
Full textCuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans, eds. ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.
Full textHölbl, Marko, Kai Rannenberg, and Tatjana Welzer, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.
Full textJanczewski, Lech Jan, and Mirosław Kutyłowski, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.
Full textFederrath, Hannes, and Dieter Gollmann, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.
Full textHoepman, Jaap-Henk, and Stefan Katzenbeisser, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.
Full textDhillon, Gurpreet, Fredrik Karlsson, Karin Hedström, and André Zúquete, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.
Full textJøsang, Audun, Lynn Futcher, and Janne Hagen, eds. ICT Systems Security and Privacy Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.
Full textOsservatorio criminalità ICT (2nd 1999? Milan, Italy?). Cyberwar o sicurezza?: II Osservatorio criminalità ICT. FrancoAngeli, 2000.
Find full textQuigley, Marian. ICT ethics and security in the 21st century: New developments and applications. Information Science Reference, 2011.
Find full textBook chapters on the topic "ICT security"
Petiwala, Fatima Farid, Insha Mearaj, and Vinod Kumar Shukla. "Analyzing Cyber Security Breaches." In ICT and Data Sciences. CRC Press, 2022. http://dx.doi.org/10.1201/9781003048862-6.
Full textRani, T. P., and K. Suganthi. "Data Security in Internet of Things." In ICT with Intelligent Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_58.
Full textSneha Jain, A., and Lakshmi Satya Vani Narayanam. "Novel Approach to Improve Security Systems." In ICT with Intelligent Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_6.
Full textBehnsen, Wolfgang, and Eberhard von Faber. "Usage of the ICT Security Standards." In Secure ICT Service Provisioning for Cloud, Mobile and Beyond. Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-658-00069-1_7.
Full textFuchs, Mathias. "Social Games: Privacy and Security." In ICT Critical Infrastructures and Society. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33332-3_30.
Full textMehta, Kaushal, Anmol Sharma, and Lakshya Bhalla. "College Automation Security Management." In Role of ICT in Higher Education. Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003130864-27.
Full textŞahin, Furkan, H. Fatih Uğurdağ, and Tolga Yalçın. "Combined AES + AEGIS Architectures for High Performance and Lightweight Security Applications." In ICT Innovations 2014. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-09879-1_22.
Full textSridhar, V. "Cyber Security: A Two-Edged Sword!" In Emerging ICT Policies and Regulations. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9022-8_9.
Full textYesmin, Tahamina, Sarmistha Agasti, and Kisalaya Chakrabarti. "5G Security and Privacy Issues: A Perspective View." In ICT with Intelligent Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_12.
Full textMotoura, Shota, Ayako Hoshino, and Itaru Hosomi. "Cooperative Hypothesis Building for Computer Security Incident Response." In ICT with Intelligent Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_49.
Full textConference papers on the topic "ICT security"
Visoottiviseth, Vasaka, Rossarin Sainont, Thanatorn Boonnak, and Vorapas Thammakulkrajang. "POMEGA: Security Game for Building Security Awareness." In 2018 Seventh ICT International Student Project Conference (ICT-ISPC). IEEE, 2018. http://dx.doi.org/10.1109/ict-ispc.2018.8523965.
Full text"Security issues in ICT." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483121.
Full text"Security issues in ICT." In 2014 7th International Symposium on Telecommunications (IST). IEEE, 2014. http://dx.doi.org/10.1109/istel.2014.7000813.
Full textJu, Hong-Il, and Jeong-Nyeo Kim. "Security architecture for smart devices." In 2012 International Conference on ICT Convergence (ICTC). IEEE, 2012. http://dx.doi.org/10.1109/ictc.2012.6386787.
Full text"AN ICT SECURITY MANAGEMENT FRAMEWORK." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002989304590462.
Full textKim, Geon-Woo, and Jong-Wook Han. "Security model for video surveillance system." In 2012 International Conference on ICT Convergence (ICTC). IEEE, 2012. http://dx.doi.org/10.1109/ictc.2012.6386789.
Full textParuchuri, Vineetha. "Inter-vehicular communications: Security and reliability issues." In 2011 International Conference on ICT Convergence (ICTC). IEEE, 2011. http://dx.doi.org/10.1109/ictc.2011.6082689.
Full textAbassi, Ryma, and Sihem Guemara El Fatmi. "Using security policies in a network securing process." In 2011 18th International Conference on Telecommunications (ICT). IEEE, 2011. http://dx.doi.org/10.1109/cts.2011.5898961.
Full textGeiger, Gebhard. "ICT Security Risk Management: Economic Perspectives." In 2014 Federated Conference on Computer Science and Information Systems. PTI, 2014. http://dx.doi.org/10.15439/2014f439.
Full textKatara, Sanjeev Kumar, and Avinash Pokhriyal. "An ICT-based Border Security Framework." In ICEGOV '17: 10th International Conference on Theory and Practice of Electronic Governance. ACM, 2017. http://dx.doi.org/10.1145/3047273.3047347.
Full textReports on the topic "ICT security"
Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, et al. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0003930.
Full textStouffer, K. A., J. A. Falco, and K. A. Scarfone. Guide to Industrial control Systems (ICS) security :. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-82e2008.
Full textStouffer, Keith, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-82r2.
Full textWendzel, Steffen, and Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. River Publishers, 2016. http://dx.doi.org/10.13052/popcas010.
Full textGarcia-Morchon, O., S. Kumar, and M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8576.
Full textAnderson, Dale, and Emily Schultz-Fellenz. Multi-INT Signature Collection and Exploitation for Security Los Alamos LDRD Report. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1823730.
Full textKhan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20190016.
Full textKim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004195.
Full textBrzoska, Michael, Wuyi Omitoogun, and Elisabeth Sköns. The Human Security Case for Military Expenditure Reductions. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/tmrz9944.
Full textThomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.
Full text