Academic literature on the topic 'IT security management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT security management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IT security management"

1

van Benthem, Boris, and Sven Malte Sopha. "Security management." Digitale Welt 2, no. 1 (2017): 55–59. http://dx.doi.org/10.1007/s42354-018-0029-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Westphall, Carlos Becker, and Peter Mueller. "Management of Security and Security for Management Systems." Journal of Network and Systems Management 18, no. 3 (2010): 241–43. http://dx.doi.org/10.1007/s10922-010-9172-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kný, Milan. "Security Management - Systems Approach." Acta Informatica Pragensia 4, no. 3 (2015): 326–35. http://dx.doi.org/10.18267/j.aip.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Yejun, and Fansong Meng. "Categorizing Security for Security Management and Information Resource Management." Journal of Strategic Security 11, no. 4 (2019): 72–84. http://dx.doi.org/10.5038/1944-0472.11.4.1694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Domozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Full text
Abstract:
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications
APA, Harvard, Vancouver, ISO, and other styles
7

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Full text
Abstract:
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks
APA, Harvard, Vancouver, ISO, and other styles
8

Martins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.

Full text
Abstract:
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military organization is built on the basis of physical and human attack vectors, and targeting th
APA, Harvard, Vancouver, ISO, and other styles
9

Meyer, Helen. "Security, management converge." Computers & Security 17, no. 6 (1998): 518–19. http://dx.doi.org/10.1016/s0167-4048(98)80082-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lobo, Colin. "Security Log Management." Network Security 2003, no. 11 (2003): 6–9. http://dx.doi.org/10.1016/s1353-4858(03)01106-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IT security management"

1

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the
APA, Harvard, Vancouver, ISO, and other styles
2

Björck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.

Full text
Abstract:
Context. An SSL encrypted client-server communication is necessary to maintain the security and privacy of the communication. For an SSL encryption to work, there should be a security certificate which has a certain expiry period. Periodic renewal of the certificate after its expiry is a waste of time and an effort on part of the company. Objectives. In this study, a new system has been developed and implemented, which sends a certificate during prior communication and does not wait for the certificate to expire. Automating the process to a certain extent was done to not compromise the securit
APA, Harvard, Vancouver, ISO, and other styles
4

Dixon, David D. "Leveraging knowledge management tools to support security risk management in the Homeland Security." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10593.

Full text
Abstract:
CHDS State/Local<br>This thesis examines Knowledge Management (KM) initiatives at the Canadian Institutes of Health Research (CIHR), the United Kingdom (UK), and the National Aeronautics and Space Administration (NASA). The first goal was to identify existing KM approaches that would foster higher levels of knowledge sharing and collaboration among security risk management practitioners within Homeland Security (DHS) agencies to enhance risk-informed decision-making activities. Through the analysis of the three case studies, it was discovered that organizational culture, more than any particu
APA, Harvard, Vancouver, ISO, and other styles
5

Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.

Full text
Abstract:
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem that this thesis study deals with is the central management of a large number and variety of services that provide organization-wide network and information security. This study addresses two problem areas: how to better manage the security of a network, and how to explain the security issues to upper management better. The study proposes a Security Management System (SMS) to be used for network security management, monitoring and reporting purposes. The system is a custom made, central manag
APA, Harvard, Vancouver, ISO, and other styles
6

Eggert, Sandy. "Das aktuelle Stichwort : Security management." Universität Potsdam, 2008. http://opus.kobv.de/ubp/volltexte/2010/4446/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, C. S. "Security management in ATM networks." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597574.

Full text
Abstract:
Authentication and key exchange protocol is vital to the operation of a secure control plane. An inefficiency in the CCITT X.509 protocol is identified and an improvement is proposed so that the extra protocol run is eliminated. This dissertation proposes that the open control model of devolving control from the network equipment offers greatest flexibility for the implementation of secure control functions. An instance of a open signalling based control architecture was outlined and a solution to the secure bootstrap process in such a distributed processing environment is presented. With this
APA, Harvard, Vancouver, ISO, and other styles
8

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Full text
Abstract:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized tr
APA, Harvard, Vancouver, ISO, and other styles
9

Gutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.

Full text
Abstract:
Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National
APA, Harvard, Vancouver, ISO, and other styles
10

Hasenstab, Alexander Nikolaus. "The thoughtful security practitioner : exploring reflective practice in security risk management." Thesis, University of Portsmouth, 2017. https://researchportal.port.ac.uk/portal/en/theses/the-thoughtful-security-practitioner(f78f3e97-0672-4b47-9633-3e18534db101).html.

Full text
Abstract:
Security risk management is a young, rapidly growing and multifaceted occupation that is concerned with managing internal and external threats to organisations. The occupation is also known and frequently referred to as “corporate security”, “security management” or “in-house security”. Security risk management is part of the private security domain and contributes to the overall security architecture. Reflective practice is a learning tool, which aims to facilitate professional practice and learning by way of conscious cognitive action focusing on professional practice related issues. It is m
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "IT security management"

1

Westhuizen, Jacob Van der. Security management. Butterworths, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cazemier, Jacques A. Security management. The Stationery Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Higgins, Clay E. Applied security management. C.C. Thomas, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Effective security management. 2nd ed. Butterworth Publishers, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sennewald, Charles A. Effective security management. 2nd ed. Butterworth Publishers, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sennewald, Charles A. Effective security management. 4th ed. Butterworth-Heinemann, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Industrial security management. 2nd ed. Praeger, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Forcht, Karen Anne. Computer security management. Boyd & Fraser, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Christopher, Kenneth. Port security management. CRC Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Effective security management. 3rd ed. Butterworth-Heinemann, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IT security management"

1

Weik, Martin H. "security management." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Madigan, Michael L. "Security Management." In Handbook of Emergency Management Concepts. CRC Press, 2017. http://dx.doi.org/10.1201/b22489-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chandra Verma, Dinesh. "Security Management." In Principles of Computer Systems and Network Management. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-89009-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McCrie, Robert. "Security Management." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_42-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Madigan, Michael L. "Security management." In First Responders Handbook. CRC Press, 2017. http://dx.doi.org/10.1201/b22284-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cunningham, Andrew. "Security management." In The Humanitarian Machine. Routledge, 2021. http://dx.doi.org/10.4324/9781003139867-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McCrie, Robert. "Security Management." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

De, Brajesh. "API Security." In API Management. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-1305-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Perez, André. "Network Management." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Calles, Miguel A. "Account Management." In Serverless Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6100-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IT security management"

1

Harris, Gregory H. "Information security management." In 2009 Information Security Curriculum Development Conference. ACM Press, 2009. http://dx.doi.org/10.1145/1940976.1941006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Modiri, Nasser, and Yosef Masoudi Sobhanzadeh. "Information Security Management." In 2011 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2011. http://dx.doi.org/10.1109/cicn.2011.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bosire, Sylvia. "Information security management." In 2009 Information Security Curriculum Development Conference. ACM Press, 2009. http://dx.doi.org/10.1145/1940976.1941000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Porretti, Claudio, Raoul Lahaije, and Denis Kolev. "A New Vision for ATM Security Management: The Security Management Platform." In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ketel, Mohammed. "IT security risk management." In the 46th Annual Southeast Regional Conference. ACM Press, 2008. http://dx.doi.org/10.1145/1593105.1593203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Brijendra. "Network security and management." In 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2010. http://dx.doi.org/10.1109/iccic.2010.5705886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rojanakul, Kittichote, and Hu Liang. "Network security infrastructure management." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"SESSION FIVE - Security Management." In 2004 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2004. http://dx.doi.org/10.1109/noms.2004.1317660.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IT security management"

1

Meyer, Paul. Distributed Network Management Security,. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada325666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bretzke, John C. Global Security Program Management Plan. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1124631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fraser, Neil. System and Security Management Tools. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada334986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Muftic, Sead. Security Management for SE Linux. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada412244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Choo, Vic, Carol Muehrcke, and Rob Vienneau. Operational Information Management Security Architecture. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada462036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oshio, Takashi. Social Security and Trust Fund Management. National Bureau of Economic Research, 2004. http://dx.doi.org/10.3386/w10444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bowen, Sue, editor. Integrated safeguards and security management plan. Office of Scientific and Technical Information (OSTI), 2001. http://dx.doi.org/10.2172/788161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meyer, Paul. Internet Draft Distributed Network Management Security,. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada325665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Newman, Richard, Richard Newman, Eugene E. McPeek, et al. Security and Emergency Management-NMPEA Application. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1561721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!