To see the other types of publications on this topic, follow the link: Information and its security.

Books on the topic 'Information and its security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Information and its security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institution, British Standards, ed. IMS: Information security. BSi, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Relia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

US GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.

Full text
Abstract:
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems".
 Meets the requirements of Federal state educational standards of higher education of the latest generation.
 The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of tra
APA, Harvard, Vancouver, ISO, and other styles
7

Byrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.

Full text
Abstract:
The textbook is intended for training in the following disciplines: "Fundamentals of information security", "Information security", "Information security", "Threats to information security", "Malicious programs", "Antivirus programs", "Information security standards", "Technology for building secure automated systems". There are control questions for each chapter, a glossary, a list of topics for abstracts, tests with answers are given at the end. The presented material was tested in the classroom at the Plekhanov Russian University of Economics.
 Meets the requirements of the federal sta
APA, Harvard, Vancouver, ISO, and other styles
11

United States. Department of Homeland Security. Office of Inspector General. Improvements necessary in DHS' security program and practices for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

United States. Department of Homeland Security. Office of Inspector General. DHS has made improvements on the security program for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

B, Rudman Warren, and United States President, eds. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy. The Board, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Red'kina, Natal'ya. Fundamentals of information culture and information security. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/1915784.

Full text
Abstract:
The textbook is devoted to the most important pedagogical problem related to the development of personal information culture in the process of transformation of the information society and the socio-cultural environment, the emergence of information threats and the impact of information and communication technologies on all spheres of human activity and information needs of users. It covers a wide range of issues related to understanding the role of information in society and the phenomenon of information culture. Modern trends in the development of the information society, legal, technical an
APA, Harvard, Vancouver, ISO, and other styles
15

Derbin, Evgeniy, and Anatoliy Caregorodcev. Information warfare: conceptual foundations of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2084342.

Full text
Abstract:
The textbook contains lecture materials on the academic discipline "Fundamentals of information warfare", executed in the form of an atlas of basic diagrams representing the content of the issues under consideration in a form convenient for perception and understanding of the interrelationships of all processes and phenomena.
 It may be of interest both for employees of departments whose activities are related to ensuring information security of credit and financial sector organizations, and for teachers, students and postgraduates studying in training areas and specialties related to an
APA, Harvard, Vancouver, ISO, and other styles
16

1957-, Cobb Michael, ed. IIS security. McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

United States. Department of Homeland Security. Office of Inspector General. DHS can take actions to address its additional cybersecurity responsibilities. Department of Homeland Security, Office of Inspector General, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gene, Aloise, ed. Information security: National Nuclear Security Administration needs to improve contingency planning for its classified supercomputing operations : report to congressional requesters. U.S. Govt. Accountability Office, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
20

United States. Department of Homeland Security. Office of Inspector General. DHS needs to address challenges to its financial systems consolidation initiative. U.S. Dept. of Homeland Security, Office of Inspector General, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Office, General Accounting. Information security: USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dale, Kutnick, ed. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

McLaughlin, Keith. Internet banking in Ireland: Are we securing its existence. University College Dublin, Graduate School of Business, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

United States. National Aeronautics and Space Administration. Office of Audits. NASA's management of its smartphones, tablets, and other mobile devices. National Aeronautics and Space Administration, Office of Inspector General, Office of Audits, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Office, General Accounting. Industrial security: DOD cannot provide adequate assurances that its oversight ensures the protection of classified information : report to the Committee on Armed Services, U.S. Senate. U.S. General Accounting Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

International Conference on Information Security and Assurance (3rd : 2009 : Seoul, Korea), ed. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Park, Jong Hyuk, and Jong Hyuk Park. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sychev, Yuriy. Information security standards. Protection and processing of confidential documents. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942679.

Full text
Abstract:
The textbook covers all Russian and major international information security standards in force according to Rosstandart. After each chapter there are control questions; at the end there is a list of topics for abstracts and verification tests with answers.
 Meets the requirements of the federal state educational standards of secondary vocational education of the latest generation.
 It is intended for students studying the disciplines "Information security standards", "Information security", "Information protection". It will be useful for specialists working in the field of informati
APA, Harvard, Vancouver, ISO, and other styles
29

United States. Department of Homeland Security. Office of Inspector General. DHS needs to manage its radio communication program better. Department of Homeland Security, Office of Inspector General, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Caregorodcev, Anatoliy, Sergey Romanovskiy, and Sergey Volkov. Risk analysis in the processes of ensuring information security of the life cycle of financial automated information systems. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2049718.

Full text
Abstract:
One of the key elements of the development strategy of a modern organization is the solution of the task of transforming the information security risk management system. Today, more and more modern organizations are moving away from the maturity-based model in favor of a risk-based approach. The monograph examines this approach and provides recommendations for its application in credit and financial organizations.
 It may be of interest both for employees of departments whose activities are related to risk analysis and management, credit and financial organizations, and for teachers, stud
APA, Harvard, Vancouver, ISO, and other styles
31

Office, General Accounting. Document security: Justice can improve its controls over classified and sensitive documents : report to the Chairman, Information, Justice, Transportation and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Office, General Accounting. Nuclear security: DOE's progress on reducing its security clearance work load : report to the Chairman, Committee on Government Operations, House of Representatives. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

John, Mueller. Microsoft IIS 7 Implementation and Administration. John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

B, Rudman Warren, and United States. President's Foreign Intelligence Advisory Board., eds. The Rudman report: Science at its best, security at its worst : hearing before the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, June 22, 1999. U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Novosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.

Full text
Abstract:
The object of study in the monograph is the conflict "information security system of infocommunication networks of critical socio-economic infrastructure objects — an attacker (criminal element)". The subject of the research is the development of a methodology for conflict-active project management for the development of information security systems for these networks, including models for supporting project decision-making. The theoretical basis of the above is the provisions of system analysis, the theory of management and decision-making, the theory of active systems, the theory of informat
APA, Harvard, Vancouver, ISO, and other styles
36

Polischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.

Full text
Abstract:
The tutorial is devoted to the implementation of relational databases. Its purpose is to master the basic principles of design, implementation, maintenance and information security of databases. The manual includes tasks for laboratory work, control questions and tests for self-examination.
 Meets the requirements of the Federal state educational standards of higher education of the last generation.
 For students of higher educational institutions of all specialties and areas of training, interested in the design, implementation and security of databases.
APA, Harvard, Vancouver, ISO, and other styles
37

Office, General Accounting. Information technology: FBI needs an enterprise architecture to guide its modernization activities : report to congressional requesters. U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Office, General Accounting. Information security: IRS electronic filing systems : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Attorney-General, United States, ed. Information technology: INS needs to better manage the development of its enterprise architecture : report to the Attorney General, Department of Justice. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

shih, Taiwan) Workshop on Cryptology and Information Security (1998 Tʻai-nan. Proceedings of Workshop on Cryptology and Information Security: International Computer Symposium (ICS '98) : National Cheng Kung University : Tainan, Taiwan, R.O.C. : December 17-19, 1998. National Cheng Kung University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Oreshina, Marina, and Andrey Garnov. Information management technologies in the context of digital transformation. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2186397.

Full text
Abstract:
The textbook provides a general description of the processes of collecting, transmitting, and storing information using information management systems in organizations and enterprises, and discusses information processing methods and tools, including data visualization using the Yandex DataLens service. The creation of a complex of interrelated models of information processes is considered, the development of methods that allow automated solutions to various problems of an applied nature is presented, ways and means of implementing information technologies are shown: methodological, informatio
APA, Harvard, Vancouver, ISO, and other styles
42

Office, General Accounting. Homeland security: INS cannot locate many aliens because it lacks reliable address information : report to congressional requesters. U.S. GAO, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Office, United States Government Accountability. Nuclear security: DOE needs better information to guide its expanded recovery of sealed radiological sources : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. U.S. Government Accountability Office, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

United States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

United States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Cryptography and Its Applications in Information Security. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-3768-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cyberwarfare and its impact on international security. United Nations, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Social security and its users: From red tape to information access. International Social Security Association, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Alexander, Philip. Information Security. www.praeger.com, 2008. http://dx.doi.org/10.5040/9798400670206.

Full text
Abstract:
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a pr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!