Books on the topic 'Information and Integrity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information and Integrity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Sinnett, William M. Excellence in information integrity. Financial Executives Research Foundation, 2008.
Find full textBosselaers, Antoon, and Bart Preneel, eds. Integrity Primitives for Secure Information Systems. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60640-8.
Full textLynch, Clifford A. Accessibility and integrity of networked information collections. Office of Technology Assessment, Congress of the United States, 1993.
Find full textJajodia, Sushil, William List, Graeme McGregor, and Leon Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35317-3.
Full textJajodia, Sushil, William List, Graeme W. McGregor, and Leon A. M. Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35396-8.
Full textvan Biene-Hershey, Margaret E., and Leon Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35501-6.
Full textJ, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. IEEE Press, 1992.
Find full textGertz, Michael, Erik Guldentops, and Leon Strous, eds. Integrity, Internal Control and Security in Information Systems. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2.
Full textGertz, Michael, ed. Integrity and Internal Control in Information Systems V. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35693-8.
Full textJajodia, Sushil, and Leon Strous, eds. Integrity and Internal Control in Information Systems VI. Springer US, 2004. http://dx.doi.org/10.1007/b116855.
Full textDooley, Bill. Ensuring data integrity at Bell Atlantic. Information Management Forum, 1998.
Find full textDowland, Paul, Steve Furnell, Bhavani Thuraisingham, and X. Sean Wang, eds. Security Management, Integrity, and Internal Control in Information Systems. Springer US, 2005. http://dx.doi.org/10.1007/0-387-31167-x.
Full textBoritz, J. Efrim. Managing enterprise information integrity: Security, control, and audit issues. IT Governance Institute, 2004.
Find full textGroup, Butler, ed. Data quality and integrity: Essential steps for exploiting business information. Butler Direct Limited, 2004.
Find full textAntoon, Bosselaers, and Preneel Bart 1963-, eds. Integrity primitives for secure information systems: Final report of RACE Integrity Primitives Evaluation RIPE RACE (1040). Springer-Verlag, 1995.
Find full textDuranti, Luciana. Preservation of the Integrity of Electronic Records. Springer Netherlands, 2002.
Find full textSteele, Robert David. Intelligence for earth: Clarity, integrity, & sustainability. Earth Intelligence Network, 2010.
Find full textSeminars, Unicom, ed. Information security: confidentiality, integrity and availability: 3-5 July 1990. Unicom Seminars, 1990.
Find full textJajodia, Sushil. Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in information systems. Springer US, 1997.
Find full textWalter, LaMendola, ed. The integrity of intelligence: A bill of rights for the information age. Macmillan, 1992.
Find full textWalter, LaMendola, ed. The integrity of intelligence: A bill of rights for the information age. St. Martins, 1993.
Find full textDuranti, Luciana. Preservation of the integrity of electronic records. Kluwer Academic, 2002.
Find full textGertz, Michael. Integrity and Internal Control in Information Systems V: IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11-12, 2002, Bonn, Germany. Springer US, 2003.
Find full textBiene-Hershey, Margaret E. Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control. Springer US, 2000.
Find full textCommittee, on Science Engineering and Public Policy (U S. ). Committee on Ensuring the Utility and Integrity of Research Data in a. Digital Age. Ensuring the integrity, accessibility, and stewardship of research data in the digital age. National Academies Press, 2009.
Find full textCommittee on Science, Engineering, and Public Policy (U.S.). Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age. Ensuring the integrity, accessibility, and stewardship of research data in the digital age. National Academies Press, 2009.
Find full textCommittee on Science, Engineering, and Public Policy (U.S.). Committee on Ensuring the Utility and Integrity of Research Data in a Digital Age. Ensuring the integrity, accessibility, and stewardship of research data in the digital age. National Academies Press, 2009.
Find full textIFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (1st 1997 Zurich, Switzerland). Integrity and internal control in information systems: IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems, 4-5 December 1997, Zürich, Switzerland. Chapman & Hall, 1997.
Find full textIFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (5th 2002 Bonn, Germany). Integrity and internal control in Information Systems V: IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany. Kluwer Academic Publishers, 2003.
Find full textWorkshop, on Integrity Policy in Computer Information Systems (1987 Waltham Mass ). Report of the invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS). U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.
Find full textSystems, IFIP TC11 WG11 5. Working Conference on Integrity and Internal Control in Information. Integrity and internal control on information systems VI: IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 November 2003, Lausanne, Switzerland. Kluwer Academic, 2004.
Find full textSushil, Jajodia, and Strous Leon, eds. Integrity and internal control in information systems VI: IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 November 2003, Lausanne, Switzerland. Kluwer Academic, 2004.
Find full textIFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (4th 2001 Brussels, Belgium). Integrity, internal control and security in information systems: Connecting governance and technology : IFIP TC11/WG11.5 Fourth Working Conference on Integrity and Internal Control in Information Systems, November 15-16, 2001, Brussels, Belgium. Kluwer Academic Publishers, 2002.
Find full textIFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (3rd 1999 Amsterdam, Netherlands). Integrity and internal control in information systems: Strategic views on the need for control : IFIP TC11 WG11.5 Third Working Conference on Integrity and Internal Control in Information Systems, November 18-19, 1999, Amsterdam, The Netherlands. Kluwer Academic Publishers, 2000.
Find full textIFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th 1990 Espoo, Finland). Computer security and information integrity: Proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990. North-Holland, 1991.
Find full textVance, Linda K. Assessing wetland condition with GIS: A landscape integrity model for Montana. Montana Natural Heritage Program, 2009.
Find full textSushil, Jajodia, ed. Integrity and internal control in information systems: IFIP TC11 Working Group 11.5 Working Conference on Integrity and Internal Control in Information Systems, Bridging Business Requirements and Research Results : Warrenton, Virginia, USA, November 19-20, 1998. Kluwer Academic, 1998.
Find full textDivision, Montana Legislature Legislative Audit. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Legislative Audit Division, 2009.
Find full textGroup, Primary Research. International survey of academic library data curation practices. Primary Research Group, 2013.
Find full textSeadle, Michael. Measurement of Information Integrity. Taylor & Francis Group, 2021.
Find full textSeadle, Michael. Measurement of Information Integrity. Taylor & Francis Group, 2021.
Find full textSeadle, Michael S. Measurement of Information Integrity. Taylor & Francis Group, 2021.
Find full textSeadle, Michael S. Measurement of Information Integrity. Taylor & Francis Group, 2021.
Find full textContemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Find full textAccessibility and integrity of networked information collections. Congress of the U.S., Office of Technology Assessment, 1993.
Find full textSimmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Find full textGertz, Michael. Integrity, Internal Control and Security in Information Systems. Springer, 2013.
Find full textDittrich, K. Computer Security and Information Integrity: Proceedings of the Sixth Ifip International Conference on Computer Security and Information Integrity I. North-Holland, 1991.
Find full text