Academic literature on the topic 'Information security toolkit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security toolkit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security toolkit"
Calix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security." Information 11, no. 2 (February 11, 2020): 100. http://dx.doi.org/10.3390/info11020100.
Full textMacy, Jason. "Product vs toolkit: API and IAM security." Network Security 2019, no. 6 (June 2019): 13–15. http://dx.doi.org/10.1016/s1353-4858(19)30073-x.
Full textMasloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.
Full textKlychova, Guzaliya, Alsu Zakirova, Angelina Dyatlova, Augul Klychova, and Nailya Zalyalova. "METHODOLOGICAL TOOLKIT FOR ENSURING ECONOMIC SECURITY IN THE PERSONNEL MANAGEMENT SYSTEM." Vestnik of Kazan State Agrarian University 15, no. 3 (November 30, 2020): 107–13. http://dx.doi.org/10.12737/2073-0462-2020-107-113.
Full textMasloboev, A. V. "Software system «Network-centric managerial structures synthesizer»." Informacionno-technologicheskij vestnik 14, no. 4 (December 30, 2017): 145–55. http://dx.doi.org/10.21499/2409-1650-2017-4-145-155.
Full textWerner, J., Y. Lee, B. Malin, A. Ledeczi, and J. Mathe. "Model-based Design of Clinical Information Systems." Methods of Information in Medicine 47, no. 05 (2008): 399–408. http://dx.doi.org/10.3414/me9121.
Full textZatonatskiy, D. "Diagnostics of Insider Risks and Threats in Personnel Security Management of the Enterprise." Bulletin of Taras Shevchenko National University of Kyiv. Economics, no. 204 (2019): 20–27. http://dx.doi.org/10.17721/1728-2667.2019/204-3/3.
Full textJaïdi, Faouzi, Faten Labbene Ayachi, and Adel Bouhoula. "A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures." Security and Communication Networks 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/7142170.
Full textGonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, and Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit." Sensors 21, no. 16 (August 15, 2021): 5493. http://dx.doi.org/10.3390/s21165493.
Full textNatsiavas, Pantelis, Giovanni Mazzeo, Giuliana Faiella, Paolo Campegiani, Jos Dumortier, Oana Stan, Marco Nalin, et al. "Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project." Health Informatics Journal 27, no. 2 (April 2021): 146045822110214. http://dx.doi.org/10.1177/14604582211021459.
Full textDissertations / Theses on the topic "Information security toolkit"
Korovessis, Peter. "Establishing an information security awareness and culture." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3836.
Full text(8800973), Kelsey Billups. "New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?" Thesis, 2020.
Find full textBooks on the topic "Information security toolkit"
Chris, Goggans, ed. The complete Internet business toolkit. New York: Van Nostrand Reinhold, 1996.
Find full textSchwartau, Winn. The complete Internet business toolkit. New York: John Wiley & Sons, 1996.
Find full textBlokdijk, Gerard. IT risk management guide: Risk management implementation guide, presentations, blueprints, templates : complete risk management toolkit guide for information technology processes and systems. Brisbane, Australia: Art of Service, 2008.
Find full textInformation Security Risk Assessment Toolkit. Elsevier, 2013. http://dx.doi.org/10.1016/c2010-0-69579-4.
Full textCohen, Fred. The Chief Information Security Officer's Toolkit: Security Program Metrics. Fred Cohen & Associates, 2005.
Find full textCohen, Fred. The Chief Information Security Officer's Toolkit: Governance Guidebook. Fred Cohen & Associates, 2005.
Find full textInformation Security Risk Assessment Toolkit Practical Assessments Through Data Collection And Data Analysis. Syngress Publishing, 2012.
Find full textMartin, Keith M. Closing Remarks. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0015.
Full textGOVERNMENT, US. 21st Century Comprehensive Terrorism Survival Information Toolkit: Featuring U.S. Military Antiterrorism Personal Protection Guide, Self-Help Guide to Antiterrorism, with Additional Emergency Terrorism Plans from FEMA and the Department of Homeland Security ¿ Nuclear, Biological, Chemical Attack Threats, Shelter in Place Options. Progressive Management, 2004.
Find full textBook chapters on the topic "Information security toolkit"
Pirocca, Simone, Luca Allodi, and Nicola Zannone. "A Toolkit for Security Awareness Training Against Targeted Phishing." In Information Systems Security, 137–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65610-2_9.
Full textDavidson, Alex, and Carlos Cid. "An Efficient Toolkit for Computing Private Set Operations." In Information Security and Privacy, 261–78. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59870-3_15.
Full textCoopamootoo, Kovila P. L., and Thomas Groß. "Cyber Security and Privacy Experiments: A Design and Reporting Toolkit." In IFIP Advances in Information and Communication Technology, 243–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92925-5_17.
Full textBogdanov, Dan, Roman Jagomägis, and Sven Laur. "A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining." In Intelligence and Security Informatics, 112–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30428-6_9.
Full textKeyser, Tobias. "Security policy." In The Information Governance Toolkit, 57–62. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-13.
Full textKeyser, Tobias. "Security responsibilities." In The Information Governance Toolkit, 63–64. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-14.
Full textKeyser, Tobias. "Security incidents." In The Information Governance Toolkit, 69–72. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-16.
Full textKeyser, Tobias. "Security Monitoring." In The Information Governance Toolkit, 73–75. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-17.
Full textKeyser, Tobias. "Confidentiality and security training needs." In The Information Governance Toolkit, 24–25. CRC Press, 2018. http://dx.doi.org/10.1201/9781315385488-5.
Full textR., Aarthee, and Ezhilmaran D. "Cyber Crime Toolkit Development." In Handbook of Research on Network Forensics and Analysis Techniques, 184–224. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch011.
Full textConference papers on the topic "Information security toolkit"
McLendon, William C., Timothy M. Shead, Andrew Wilson, Brian Wylie, and Jeffrey Baumes. "Network algorithms for information analysis using the Titan Toolkit." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678695.
Full textAccorsi, Rafael, Claus Wonnemann, and Sebastian Dochow. "SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.108.
Full textHuynen, Jean-Louis, and Gabriele Lenzini. "From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis." In 3rd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2017. http://dx.doi.org/10.5220/0006211302130224.
Full textWang, Tian, Hui Xu, Yi Zhu, Jieqing Ai, and Wubing Zhou. "Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System." In 2012 National Conference on Information Technology and Computer Science. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/citcs.2012.114.
Full textEl Kafrawy, Passent M., Amr M. Sauber, Mohamed M. Hafez, and Amr F. Shawish. "HDFSx: An Enhanced Model to Handle Small Files in Hadoop with a Simulating Toolkit." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8442036.
Full textChapman, Robert E., Jeffrey T. Fong, David T. Butry, Douglas S. Thomas, James J. Filliben, and N. Alan Heckert. "An Economics-Based Intelligence (EI) Tool for Pressure Vessel and Piping (PVP) Failure Consequence Estimation." In ASME 2010 Pressure Vessels and Piping Division/K-PVP Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/pvp2010-25226.
Full textDibb, Patrick, and Mohammad Hammoudeh. "Forensic Data Recovery from Android OS Devices: An Open Source Toolkit." In 2013 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2013. http://dx.doi.org/10.1109/eisic.2013.58.
Full textOrmerod, Thomas, Lingyu Wang, Mourad Debbabi, Amr Youssef, Hamad Binsalleeh, Amine Boukhtouta, and Prosenjit Sinha. "Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.39.
Full text