Books on the topic 'Information and its security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information and its security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.
Full textKeith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.
Find full textRelia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.
Find full textUS GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.
Find full textSychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textByrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.
Find full textUnited States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.
Find full textSychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.
Full textUnited States. Department of Homeland Security. Office of Inspector General. Improvements necessary in DHS' security program and practices for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. DHS has made improvements on the security program for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.
Find full textB, Rudman Warren, and United States President, eds. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy. The Board, 1999.
Find full textRed'kina, Natal'ya. Fundamentals of information culture and information security. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/1915784.
Full textDerbin, Evgeniy, and Anatoliy Caregorodcev. Information warfare: conceptual foundations of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2084342.
Full textUnited States. Department of Homeland Security. Office of Inspector General. DHS can take actions to address its additional cybersecurity responsibilities. Department of Homeland Security, Office of Inspector General, 2013.
Find full textGene, Aloise, ed. Information security: National Nuclear Security Administration needs to improve contingency planning for its classified supercomputing operations : report to congressional requesters. U.S. Govt. Accountability Office, 2010.
Find full textMaksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Full textUnited States. Department of Homeland Security. Office of Inspector General. DHS needs to address challenges to its financial systems consolidation initiative. U.S. Dept. of Homeland Security, Office of Inspector General, 2010.
Find full textOffice, General Accounting. Information security: USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives. The Office, 2000.
Find full textDale, Kutnick, ed. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.
Find full textMcLaughlin, Keith. Internet banking in Ireland: Are we securing its existence. University College Dublin, Graduate School of Business, 1998.
Find full textUnited States. National Aeronautics and Space Administration. Office of Audits. NASA's management of its smartphones, tablets, and other mobile devices. National Aeronautics and Space Administration, Office of Inspector General, Office of Audits, 2014.
Find full textOffice, General Accounting. Industrial security: DOD cannot provide adequate assurances that its oversight ensures the protection of classified information : report to the Committee on Armed Services, U.S. Senate. U.S. General Accounting Office, 2004.
Find full textInternational Conference on Information Security and Assurance (3rd : 2009 : Seoul, Korea), ed. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.
Find full textPark, Jong Hyuk, and Jong Hyuk Park. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.
Find full textSychev, Yuriy. Information security standards. Protection and processing of confidential documents. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942679.
Full textUnited States. Department of Homeland Security. Office of Inspector General. DHS needs to manage its radio communication program better. Department of Homeland Security, Office of Inspector General, 2013.
Find full textCaregorodcev, Anatoliy, Sergey Romanovskiy, and Sergey Volkov. Risk analysis in the processes of ensuring information security of the life cycle of financial automated information systems. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2049718.
Full textOffice, General Accounting. Document security: Justice can improve its controls over classified and sensitive documents : report to the Chairman, Information, Justice, Transportation and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1993.
Find full textOffice, General Accounting. Nuclear security: DOE's progress on reducing its security clearance work load : report to the Chairman, Committee on Government Operations, House of Representatives. The Office, 1993.
Find full textJohn, Mueller. Microsoft IIS 7 Implementation and Administration. John Wiley & Sons, Ltd., 2007.
Find full textB, Rudman Warren, and United States. President's Foreign Intelligence Advisory Board., eds. The Rudman report: Science at its best, security at its worst : hearing before the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, June 22, 1999. U.S. G.P.O., 1999.
Find full textNovosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.
Full textPolischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Full textOffice, General Accounting. Information technology: FBI needs an enterprise architecture to guide its modernization activities : report to congressional requesters. U.S. General Accounting Office, 2003.
Find full textOffice, General Accounting. Information security: IRS electronic filing systems : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 2001.
Find full textAttorney-General, United States, ed. Information technology: INS needs to better manage the development of its enterprise architecture : report to the Attorney General, Department of Justice. The Office, 2000.
Find full textshih, Taiwan) Workshop on Cryptology and Information Security (1998 Tʻai-nan. Proceedings of Workshop on Cryptology and Information Security: International Computer Symposium (ICS '98) : National Cheng Kung University : Tainan, Taiwan, R.O.C. : December 17-19, 1998. National Cheng Kung University, 1998.
Find full textOreshina, Marina, and Andrey Garnov. Information management technologies in the context of digital transformation. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2186397.
Full textOffice, General Accounting. Homeland security: INS cannot locate many aliens because it lacks reliable address information : report to congressional requesters. U.S. GAO, 2002.
Find full textOffice, United States Government Accountability. Nuclear security: DOE needs better information to guide its expanded recovery of sealed radiological sources : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. U.S. Government Accountability Office, 2005.
Find full textUnited States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.
Find full textUnited States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.
Find full textCryptography and Its Applications in Information Security. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-3768-9.
Full textClassified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.
Find full textSocial security and its users: From red tape to information access. International Social Security Association, 1993.
Find full textAlexander, Philip. Information Security. www.praeger.com, 2008. http://dx.doi.org/10.5040/9798400670206.
Full text