Academic literature on the topic 'Information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security"
Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Full textImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Full textNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Full textKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Full textMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Full textAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Full textHumaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Full textErceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Full textKaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Full textYamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Full textDissertations / Theses on the topic "Information security"
Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Full textÅhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.
Full textYucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.
Full textSaltysh, S. "Information security: passwords." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.
Full textBurkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.
Full textAlfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.
Full textLund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.
Full textRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textBjörck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.
Full textTalib, Shuhaili. "Personalising information security education." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.
Full textBooks on the topic "Information security"
Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo, and Rolly Intan, eds. Information Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.
Full textLongley, Dennis, Michael Shain, and William Caelli. Information Security. Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.
Full textMambo, Masahiro, and Yuliang Zheng. Information Security. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.
Full textStamp, Mark. Information Security. John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.
Full textChow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui, and Siu Ming Yiu, eds. Information Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.
Full textChan, Agnes Hui, and Virgil Gligor, eds. Information Security. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.
Full textGollmann, Dieter, and Felix C. Freiling, eds. Information Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.
Full textSusilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li, and Rolly Intan, eds. Information Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.
Full textChen, Liqun, Mark Manulis, and Steve Schneider, eds. Information Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.
Full textZhou, Jianying, Javier Lopez, Robert H. Deng, and Feng Bao, eds. Information Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992.
Full textBook chapters on the topic "Information security"
von Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.
Full textFernando, Anjana, and Lakmal Warusawithana. "Information Security." In Beginning Ballerina Programming. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.
Full textStanley, Richard. "Information Security." In Cybercrimes: A Multidisciplinary Analysis. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.
Full textWeik, Martin H. "information security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.
Full textFox, Richard. "Information Security." In Information Technology. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.
Full textWeng, Wei. "Information Security." In A Beginner’s Guide to Informatics and Artificial Intelligence. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1477-3_9.
Full textEdward, Y. Uechi. "Information Security." In Public Service Information Technology. Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.
Full textReveron, Derek S., and Kathleen A. Mahoney-Norris. "Information Security." In Human and National Security. Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.
Full textWeik, Martin H. "security information." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.
Full textSheppey, Terence, and Ross McGill. "Information Security." In Sarbanes-Oxley. Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.
Full textConference papers on the topic "Information security"
Prathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha, and U. M. Gopal Krishna. "Digital security for securing private information." In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.
Full textNeogy, Sarmistha. "Information security." In IML 2017: International Conference on Internet of Things and Machine Learning. ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.
Full text"Information Security." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.
Full text"Information security." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.
Full textCarroll, Michael D. "Information security." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.
Full textСелейдарян, Элина Михайловна, and Матвей Артёмович Лысенко. "INFORMATION SECURITY." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.
Full textAlkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli, and Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.
Full textWu, Yue, and Katalin Takacs-Gyorgy. "Information security of food security." In 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.
Full textAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions." In 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.
Full textColbaugh, Richard, Kristin Glass, and Travis Bauer. "Dynamic information-theoretic measures for security informatics." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.
Full textReports on the topic "Information security"
Bowen, P., J. Hash, and M. Wilson. Information security handbook :. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.
Full textTsang, Wai, Karen Burkardsmaier, and Ed Scheidt. Information-Centric Security. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada421985.
Full textYoung, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada407864.
Full textLOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada386363.
Full textKissel, Richard. Small business information security :. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.
Full textLane, Brendan F., and Joseph Johnson. High Security Information System. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada418505.
Full textQuist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/6934153.
Full textMoser, William S. The Economics of Information Security. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404567.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.
Full textRosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408503.
Full text