Academic literature on the topic 'Information security practice tests'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security practice tests.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security practice tests"
Rabrenović, Aleksandra, and Rajko Radević. "LIMITS OF THE RIGHT TO FREE ACCESS TO INFORMATION IN THE SECURITY SECTOR – CASE OF MONTENEGRO." Strani pravni život 60, no. 3 (2016): 23–37. https://doi.org/10.56461/spz16302r.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textRoberts, Linda. "THE INFLUENCE OF PERSONAL CHARACTERISTICS ON SECURITY AWARENESS IN ORGANIZATIONAL SETTINGS." International Research Journal of Library and Information Sciences 2, no. 2 (2025): 1–6. https://doi.org/10.55640/irjlis-v02i02-01.
Full textSamios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (2021): 933–40. http://dx.doi.org/10.1785/0220200151.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textMadhu R. "An Approach of Sandbox Technology for Improving the Security in Online Healthcare Systems." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 703–14. https://doi.org/10.52783/jisem.v10i43s.8469.
Full textYang, Wei, and Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance." Security and Communication Networks 2021 (March 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.
Full textIkhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Full textKubiak, Ireneusz, and Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays." Applied Sciences 12, no. 10 (2022): 5281. http://dx.doi.org/10.3390/app12105281.
Full textRicciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, et al. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle." Healthcare 10, no. 1 (2022): 124. http://dx.doi.org/10.3390/healthcare10010124.
Full textDissertations / Theses on the topic "Information security practice tests"
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textWilliams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Full textHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Full textMahncke, Rachel J. "Measuring and applying information security governance within general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.
Full textMirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker." Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.
Full textVega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.
Full textShear, Christopher James. "Business counterintelligence : sustainable practice or passing fad?" Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/1930.
Full textSestorp, Isak, and André Lehto. "CPDLC in Practice : A Dissection of the Controller Pilot Data Link Communication Security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159840.
Full textSarmonpal, Sandra. "Learning Analytics from Research to Practice| A Content Analysis to Assess Information Quality on Product Websites." Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421041.
Full textNguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Full textBooks on the topic "Information security practice tests"
Christy, S. Russell, and Chuck Easttom. CompTIA® Security+® Practice Tests. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549413.
Full textDeng, Robert, Feng Bao, Guilin Wang, et al., eds. Information Security Practice and Experience. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93206-0.
Full textAkram, Raja Naeem, and Sushil Jajodia, eds. Information Security Theory and Practice. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24018-3.
Full textBao, Feng, Hui Li, and Guilin Wang, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00843-6.
Full textLaurent, Maryline, and Thanassis Giannetsos, eds. Information Security Theory and Practice. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41702-4.
Full textChen, Liqun, Yi Mu, and Willy Susilo, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79104-1.
Full textKwak, Jin, Robert H. Deng, Yoojae Won, and Guilin Wang, eds. Information Security, Practice and Experience. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1.
Full textDeng, Robert H., and Tao Feng, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4.
Full textHeng, Swee-Huay, and Javier Lopez, eds. Information Security Practice and Experience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2.
Full textRyan, Mark D., Ben Smyth, and Guilin Wang, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2.
Full textBook chapters on the topic "Information security practice tests"
Li, Xiehua, Shutang Yang, Jianhua Li, and Hongwen Zhu. "Security Protocol Analysis with Improved Authentication Tests." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_12.
Full textPark, Heejin, Sang Kil Park, Ki-Ryong Kwon, and Dong Kyue Kim. "Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31979-5_7.
Full textZhou, Xuhua, Xuhua Ding, and Kefei Chen. "Lightweight Delegated Subset Test with Privacy Protection." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21031-0_11.
Full textCai, Jun, Jian-Zhen Luo, Jianliang Ruan, and Yan Liu. "Toward Fuzz Test Based on Protocol Reverse Engineering." In Information Security Practice and Experience. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_56.
Full textZhao, Hui, Yongbin Zhou, François-Xavier Standaert, and Hailong Zhang. "Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_24.
Full textAzad, Nasreen. "DevOps Challenges and Risk Mitigation Strategies by DevOps Professionals Teams." In Lecture Notes in Business Information Processing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_26.
Full textPoonia, Ramesh Chandra, Kamal Upreti, Bosco Paul Alapatt, and Samreen Jafri. "Real-Time Cyber-Physical Risk Management Leveraging Advanced Security Technologies." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4581-4_25.
Full textFan, Limin, Hua Chen, and Si Gao. "A General Method to Evaluate the Correlation of Randomness Tests." In Information Security Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_4.
Full textde Carvalho, Luciano Gonçalves, and Marcelo Medeiros Eler. "Security Requirements and Tests for Smart Toys." In Enterprise Information Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93375-7_14.
Full textKaksonen, Rauli, Kimmo Halunen, Marko Laakso, and Juha Röning. "Transparent Security Method for Automating IoT Security Assessments." In Information Security Practice and Experience. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-7032-2_9.
Full textConference papers on the topic "Information security practice tests"
Schanck, John M. "Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00128.
Full textMai, Junlang, Baifeng Ning, and Zhining Lv. "Practice analysis of collaborative security application of power big data." In The International Conference Optoelectronic Information and Optical Engineering (OIOE2024), edited by Yang Yue and Lu Leng. SPIE, 2025. https://doi.org/10.1117/12.3045855.
Full textFang, Fang. "University Data Security Practice Under the Background of Digital Transformation." In 2024 3rd International Conference on Artificial Intelligence and Computer Information Technology (AICIT). IEEE, 2024. http://dx.doi.org/10.1109/aicit62434.2024.10730168.
Full textFAN, Haifeng, Mingde Bi, Lei Sun, and Yang Liu. "Design and practice of a whole network balancing system considering multiple types of loads." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061927.
Full textDinh, Linh Hoang, Luong Tran Thi, and Long Nguyen Van. "On the Mathematical Aspects of Cryptographic Randomness Tests Using Discrete Fourier Transform." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813437.
Full textLinenberg, Amos. "Continuous on Site Monitoring of VOCs in Water Sources." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4677.
Full textPoon, Anthony, Sarah Giroux, Parfait Eloundou-Enyegue, François Guimbretière, and Nicola Dell. "Baccalauréat Practice Tests in Cameroon." In ICTD2020: Information and Communication Technologies and Development. ACM, 2020. http://dx.doi.org/10.1145/3392561.3394646.
Full textMouelhi, Tejeddine, Yves Le Traon, and Benoit Baudry. "Mutation Analysis for Security Tests Qualification." In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taic.part.2007.21.
Full textMouelhi, Tejeddine, Yves Le Traon, and Benoit Baudry. "Mutation Analysis for Security Tests Qualification." In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taicpart.2007.4344128.
Full textGolchevskiy, Y. V., and N. R. Oleneva. "Conducting Interactive Activities to Enhance the Information Security Culture of the Organisation's Staff." In International scientific and practical conference “Smart cities and sustainable development of regions” (SMARTGREENS 2024). Crossref, 2025. https://doi.org/10.63550/iceip.2025.1.1.063.
Full textReports on the topic "Information security practice tests"
Pilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk, and Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4374.
Full textGoodwin, Sarah, Yigal Attali, Geoffrey LaFlair, et al. Duolingo English Test - Writing Construct. Duolingo, 2023. http://dx.doi.org/10.46999/arxn5612.
Full textCarle, Steven, Mavrik Zavarin, and Andrew Tompson. Review of Cavity Radius and Chimney Height Information for Underground Nuclear Tests at Nevada National Security Site. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1762870.
Full textRuiz-Vega, Mauricio, Ana Corbacho, and Martín Ardanaz. Mind the Gap: Bridging the Perception and Reality of Crime Rates with Information. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0011650.
Full textSergeev, Alexander, Nikolay Litusov, Ekaterina Voroshilina, et al. Electronic educational resource Microbiology, virology and immunology. SIB-Expertise, 2024. http://dx.doi.org/10.12731/er0769.29012024.
Full textDinovitzer, Aaron. PR-214-134502-R01 Weld Hydrogen Cracking Risk Management Guide. Pipeline Research Council International, Inc. (PRCI), 2019. http://dx.doi.org/10.55274/r0011591.
Full textMacedo, Jorge, Paul Mayne, Sheng Dai, et al. Cone Penetration Testing for Illinois Subsurface Characterization and Geotechnical Design. Illinois Center for Transportation, 2024. http://dx.doi.org/10.36501/0197-9191/24-013.
Full textStapleton, Amy, Emily Cunniffe, and Emma Quinn. Non-EU nationals in irregular employment in Ireland. ESRI, 2024. https://doi.org/10.26504/rs189.
Full textVilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011448.
Full textSchiller, Brandon, Tara Hutchinson, and Kelly Cobeen. Comparison of the Response of Small- and Large-Component Cripple Wall Specimens Tested under Simulated Seismic Loading (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2020. http://dx.doi.org/10.55461/iyca1674.
Full text