Academic literature on the topic 'ICT security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ICT security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ICT security"
Dave, Mayur, and Anand R. Prasad. "ICT Security and Security Testing Aspects." Journal of ICT Standardization 1, no. 2 (2013): 175–86. http://dx.doi.org/10.13052/jicts2245-800x.12a4.
Full textPasquinucci, Andrea. "Economics of ICT security." Computer Fraud & Security 2008, no. 8 (August 2008): 4–6. http://dx.doi.org/10.1016/s1361-3723(08)70123-4.
Full textKathane, Rajesh. "Information (ICT) security and Libraries." IP Indian Journal of Library Science and Information Technology 5, no. 1 (July 15, 2020): 43–45. http://dx.doi.org/10.18231/j.ijlsit.2020.009.
Full textSmolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.
Full textHills, Alice. "IV. ICT for Community Security." Whitehall Papers 91, no. 1 (September 2, 2017): 70–83. http://dx.doi.org/10.1080/02681307.2017.1462555.
Full textBostan, Atila. "Impact of education on security practices in ICT." Tehnicki vjesnik - Technical Gazette 22, no. 1 (2015): 161–68. http://dx.doi.org/10.17559/tv-20140403122930.
Full textMeghisan-Toma, Georgeta-Madalina, and Vasile Cosmin Nicula. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 362–70. http://dx.doi.org/10.2478/picbe-2020-0035.
Full textLAVINA, TATYANA A., and LARISA A. ILINA. "ICT COMPETENCE OF FUTURE INFORMATION SECURITY SPECIALISTS." Cherepovets State University Bulletin 6, no. 105 (2021): 112–28. http://dx.doi.org/10.23859/1994-0637-2021-6-105-10.
Full textAkman, İbrahim, and Atila Bostan. "ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY." PEOPLE: International Journal of Social Sciences 3, no. 3 (January 29, 2018): 1046–63. http://dx.doi.org/10.20319/pijss.2018.33.10461063.
Full textJacob, Luis, and Ricardo Pocinho. "ICT, Senior universities and digital security." Geopolitical, Social Security and Freedom Journal 2, no. 1 (November 1, 2019): 37–45. http://dx.doi.org/10.2478/gssfj-2019-0004.
Full textDissertations / Theses on the topic "ICT security"
Pandey, Bimal Raj. "Indicators for ICT security incident management." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20665.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textKvastad, Johan. "ICT Security of an Electronic Health Record System: an Empirical Investigation : An in depth investigation of ICT security in a modern healthcare system." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194121.
Full textEn empirisk undersökning av säkerheten inom ett modernt elektroniskt patientjournal-system har utförts. Undersökningen genomfördes med hjälp av dynamisk analys, manuell testning och intervjuer med utvecklarna. Resultatet indikerar att system för elektroniska patientjournaler har stora brister inom autentisering, vilka uppstår p.g.a. att flera olika kommersiella system måste samarbeta. Problemen är så allvarliga att med tillgång till en enda dator på intranätet kan en stor databas med patientdata äventyras, inklusive radiologisk data gällande patienterna. Vanliga websårbarheter fanns också, så som injektioner av skript och inkorrekt konfigurerade HTTP säkerhetsheaders. Dessa sårbarheter mitigerades starkt genom användandet av bibliotek för webinterface.
Matusík, Jan. "Zavedení managementu bezpečnosti ICT na základní škole." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224834.
Full textNäckros, Kjell. "Visualising security through computer games : investigating game-based instruction in ICT security : an experimental approach /." Kista : Department of Computer and Systems Sciences, Stockholm University : Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-533.
Full textSchoffer, Pavel. "Analýza informačního systému ISAD a návrh jeho změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241506.
Full textTarimo, Charles N. "ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354.
Full textKosek, Jindřich. "Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224444.
Full textSulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.
Full textBooks on the topic "ICT security"
De Capitani di Vimercati, Sabrina, and Fabio Martinelli, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.
Full textCuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans, eds. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.
Full textHölbl, Marko, Kai Rannenberg, and Tatjana Welzer, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.
Full textJanczewski, Lech Jan, and Mirosław Kutyłowski, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.
Full textFederrath, Hannes, and Dieter Gollmann, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.
Full textHoepman, Jaap-Henk, and Stefan Katzenbeisser, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.
Full textDhillon, Gurpreet, Fredrik Karlsson, Karin Hedström, and André Zúquete, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.
Full textJøsang, Audun, Lynn Futcher, and Janne Hagen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.
Full textOsservatorio criminalità ICT (2nd 1999? Milan, Italy?). Cyberwar o sicurezza?: II Osservatorio criminalità ICT. Milano; Italy: FrancoAngeli, 2000.
Find full textQuigley, Marian. ICT ethics and security in the 21st century: New developments and applications. Hershey, PA: Information Science Reference, 2011.
Find full textBook chapters on the topic "ICT security"
Petiwala, Fatima Farid, Insha Mearaj, and Vinod Kumar Shukla. "Analyzing Cyber Security Breaches." In ICT and Data Sciences, 63–72. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003048862-6.
Full textRani, T. P., and K. Suganthi. "Data Security in Internet of Things." In ICT with Intelligent Applications, 593–601. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_58.
Full textSneha Jain, A., and Lakshmi Satya Vani Narayanam. "Novel Approach to Improve Security Systems." In ICT with Intelligent Applications, 41–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_6.
Full textBehnsen, Wolfgang, and Eberhard von Faber. "Usage of the ICT Security Standards." In Secure ICT Service Provisioning for Cloud, Mobile and Beyond, 215–30. Wiesbaden: Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-658-00069-1_7.
Full textFuchs, Mathias. "Social Games: Privacy and Security." In ICT Critical Infrastructures and Society, 330–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33332-3_30.
Full textMehta, Kaushal, Anmol Sharma, and Lakshya Bhalla. "College Automation Security Management." In Role of ICT in Higher Education, 355–61. Chapters are selected papers from the International Conference on the Role of ICT in Higher Education: Trends, Problems and Prospects, held at the Institute of Information Technology & Management, Delhi, India, on 14th-15th February 2020.: Apple Academic Press, 2020. http://dx.doi.org/10.1201/9781003130864-27.
Full textŞahin, Furkan, H. Fatih Uğurdağ, and Tolga Yalçın. "Combined AES + AEGIS Architectures for High Performance and Lightweight Security Applications." In ICT Innovations 2014, 213–24. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-09879-1_22.
Full textSridhar, V. "Cyber Security: A Two-Edged Sword!" In Emerging ICT Policies and Regulations, 165–83. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9022-8_9.
Full textYesmin, Tahamina, Sarmistha Agasti, and Kisalaya Chakrabarti. "5G Security and Privacy Issues: A Perspective View." In ICT with Intelligent Applications, 89–98. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_12.
Full textMotoura, Shota, Ayako Hoshino, and Itaru Hosomi. "Cooperative Hypothesis Building for Computer Security Incident Response." In ICT with Intelligent Applications, 489–97. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4177-0_49.
Full textConference papers on the topic "ICT security"
Visoottiviseth, Vasaka, Rossarin Sainont, Thanatorn Boonnak, and Vorapas Thammakulkrajang. "POMEGA: Security Game for Building Security Awareness." In 2018 Seventh ICT International Student Project Conference (ICT-ISPC). IEEE, 2018. http://dx.doi.org/10.1109/ict-ispc.2018.8523965.
Full text"Security issues in ICT." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483121.
Full text"Security issues in ICT." In 2014 7th International Symposium on Telecommunications (IST). IEEE, 2014. http://dx.doi.org/10.1109/istel.2014.7000813.
Full textJu, Hong-Il, and Jeong-Nyeo Kim. "Security architecture for smart devices." In 2012 International Conference on ICT Convergence (ICTC). IEEE, 2012. http://dx.doi.org/10.1109/ictc.2012.6386787.
Full text"AN ICT SECURITY MANAGEMENT FRAMEWORK." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002989304590462.
Full textKim, Geon-Woo, and Jong-Wook Han. "Security model for video surveillance system." In 2012 International Conference on ICT Convergence (ICTC). IEEE, 2012. http://dx.doi.org/10.1109/ictc.2012.6386789.
Full textParuchuri, Vineetha. "Inter-vehicular communications: Security and reliability issues." In 2011 International Conference on ICT Convergence (ICTC). IEEE, 2011. http://dx.doi.org/10.1109/ictc.2011.6082689.
Full textAbassi, Ryma, and Sihem Guemara El Fatmi. "Using security policies in a network securing process." In 2011 18th International Conference on Telecommunications (ICT). IEEE, 2011. http://dx.doi.org/10.1109/cts.2011.5898961.
Full textGeiger, Gebhard. "ICT Security Risk Management: Economic Perspectives." In 2014 Federated Conference on Computer Science and Information Systems. PTI, 2014. http://dx.doi.org/10.15439/2014f439.
Full textKatara, Sanjeev Kumar, and Avinash Pokhriyal. "An ICT-based Border Security Framework." In ICEGOV '17: 10th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3047273.3047347.
Full textReports on the topic "ICT security"
Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.
Full textStouffer, K. A., J. A. Falco, and K. A. Scarfone. Guide to Industrial control Systems (ICS) security :. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-82e2008.
Full textStouffer, Keith, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, June 2015. http://dx.doi.org/10.6028/nist.sp.800-82r2.
Full textWendzel, Steffen, and Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Denmark: River Publishers, September 2016. http://dx.doi.org/10.13052/popcas010.
Full textGarcia-Morchon, O., S. Kumar, and M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, April 2019. http://dx.doi.org/10.17487/rfc8576.
Full textAnderson, Dale, and Emily Schultz-Fellenz. Multi-INT Signature Collection and Exploitation for Security Los Alamos LDRD Report. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1823730.
Full textKhan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20190016.
Full textKim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, April 2022. http://dx.doi.org/10.18235/0004195.
Full textBrzoska, Michael, Wuyi Omitoogun, and Elisabeth Sköns. The Human Security Case for Military Expenditure Reductions. Stockholm International Peace Research Institute, March 2022. http://dx.doi.org/10.55163/tmrz9944.
Full textThomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.
Full text