Dissertations / Theses on the topic 'Information security practice tests'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 dissertations / theses for your research on the topic 'Information security practice tests.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textWilliams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Full textHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Full textMahncke, Rachel J. "Measuring and applying information security governance within general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.
Full textMirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker." Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.
Full textVega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.
Full textShear, Christopher James. "Business counterintelligence : sustainable practice or passing fad?" Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/1930.
Full textSestorp, Isak, and André Lehto. "CPDLC in Practice : A Dissection of the Controller Pilot Data Link Communication Security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159840.
Full textSarmonpal, Sandra. "Learning Analytics from Research to Practice| A Content Analysis to Assess Information Quality on Product Websites." Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421041.
Full textNguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Full textLukweza, Chishala. "An investigation into the state-of-practice of information security within Zambian copper mines: a case study." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002776.
Full textTidwell, Craig Leonard. "Testing the impact of training with simulated scenarios for information security awareness on virtual community of practice members." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5058.
Full textAl, Smadi Duha. "Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505164/.
Full textGarcia-Patron, Sanchez Raul. "Quantum information with optical continuous variables: from Bell tests to key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2007. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210655.
Full textSiganto, Jean Josephine. "Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/83792/4/Jean_Siganto_Thesis.pdf.
Full textWang, Qianxue. "Création et évaluation statistique d'une nouvelle de générateurs pseudo-aléatoires chaotiques." Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2031.
Full textMontesdioca, Gustavo Percio Zimmermann. "Satisfação do usuário com as práticas de segurança da informação." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2013. http://hdl.handle.net/10183/72774.
Full textNorris-Jones, Lynne. "Demonstrate and document : the development of a best practice model for biometric access control management." Thesis, Cardiff Metropolitan University, 2011. http://hdl.handle.net/10369/6411.
Full textRapp, Axel. "Web site security maturity of the European Union and its member states : A survey study on the compliance with best practices of DNSSEC, HSTS, HTTPS, TLS-version, and certificate validation types." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20127.
Full textCarvalho, Luciano Gonçalves de. "Requisitos e testes de segurança para brinquedos inteligentes." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/100/100131/tde-15022018-003245/.
Full textRoberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.
Full textLin, Gary, and 林俊銘. "Enterprise Information Security - Backup Systems Planning and Practice." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47151235587414698218.
Full textLessing, Martha Maria. "A model for best practice driven information security governance." Thesis, 2008. http://hdl.handle.net/10210/524.
Full textWang, Ji Hsian, and 王繼顯. "Verification and Practice of Enterprise Information Security Pattern and Knowledge within Ontology Method." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/77748723698840124016.
Full text"Best practice strategy framework for developing countries to secure cyberspace." Thesis, 2015. http://hdl.handle.net/10210/15091.
Full textRaykova, Mariana Petrova. "Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?" Thesis, 2012. https://doi.org/10.7916/D8GH9R2Z.
Full textTU, FANG-SHENG, and 涂芳聖. "A Practice Research of Computer Mediated Communication Software on Team Performance of Outsourcing Project of Information Security." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/57196850656691960646.
Full textBotha, Carla-Lee. "A gab analysis to compare best practice recommendations legal requirements when raising information security awareness amongst home users of online banking." Diss., 2011. http://hdl.handle.net/10500/5457.
Full textBotha, Carla-Lee. "A gap analysis to compare best practice recommendations and legal requirements when raising information security awareness amongst home users of online banking." Diss., 2011. http://hdl.handle.net/10500/5457.
Full textMahopo, Ntombizodwa Bessy. "A risk based approach for managing information technology security risk within a dynamic environment." Diss., 2015. http://hdl.handle.net/10500/21925.
Full textMaguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.
Full textPerkins, Catharina Elizabetha. "The management of an information technology infrastructure in schools in the Western Cape Province." Diss., 2012. http://hdl.handle.net/10500/9266.
Full text