Academic literature on the topic 'IT security management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT security management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IT security management"
van Benthem, Boris, and Sven Malte Sopha. "Security management." Digitale Welt 2, no. 1 (2017): 55–59. http://dx.doi.org/10.1007/s42354-018-0029-y.
Full textWestphall, Carlos Becker, and Peter Mueller. "Management of Security and Security for Management Systems." Journal of Network and Systems Management 18, no. 3 (2010): 241–43. http://dx.doi.org/10.1007/s10922-010-9172-y.
Full textKný, Milan. "Security Management - Systems Approach." Acta Informatica Pragensia 4, no. 3 (2015): 326–35. http://dx.doi.org/10.18267/j.aip.79.
Full textWu, Yejun, and Fansong Meng. "Categorizing Security for Security Management and Information Resource Management." Journal of Strategic Security 11, no. 4 (2019): 72–84. http://dx.doi.org/10.5038/1944-0472.11.4.1694.
Full textDomozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.
Full textKuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Full textSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Full textMartins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Full textMeyer, Helen. "Security, management converge." Computers & Security 17, no. 6 (1998): 518–19. http://dx.doi.org/10.1016/s0167-4048(98)80082-5.
Full textLobo, Colin. "Security Log Management." Network Security 2003, no. 11 (2003): 6–9. http://dx.doi.org/10.1016/s1353-4858(03)01106-1.
Full textDissertations / Theses on the topic "IT security management"
Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textBjörck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.
Full textBoinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.
Full textDixon, David D. "Leveraging knowledge management tools to support security risk management in the Homeland Security." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10593.
Full textOnder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.
Full textEggert, Sandy. "Das aktuelle Stichwort : Security management." Universität Potsdam, 2008. http://opus.kobv.de/ubp/volltexte/2010/4446/.
Full textCheng, C. S. "Security management in ATM networks." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597574.
Full textKarthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Full textGutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.
Full textHasenstab, Alexander Nikolaus. "The thoughtful security practitioner : exploring reflective practice in security risk management." Thesis, University of Portsmouth, 2017. https://researchportal.port.ac.uk/portal/en/theses/the-thoughtful-security-practitioner(f78f3e97-0672-4b47-9633-3e18534db101).html.
Full textBooks on the topic "IT security management"
Sennewald, Charles A. Effective security management. 2nd ed. Butterworth Publishers, 1985.
Find full textSennewald, Charles A. Effective security management. 4th ed. Butterworth-Heinemann, 2003.
Find full textBook chapters on the topic "IT security management"
Weik, Martin H. "security management." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16818.
Full textMadigan, Michael L. "Security Management." In Handbook of Emergency Management Concepts. CRC Press, 2017. http://dx.doi.org/10.1201/b22489-3.
Full textChandra Verma, Dinesh. "Security Management." In Principles of Computer Systems and Network Management. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-89009-8_9.
Full textMcCrie, Robert. "Security Management." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_42-1.
Full textMadigan, Michael L. "Security management." In First Responders Handbook. CRC Press, 2017. http://dx.doi.org/10.1201/b22284-2.
Full textCunningham, Andrew. "Security management." In The Humanitarian Machine. Routledge, 2021. http://dx.doi.org/10.4324/9781003139867-21.
Full textMcCrie, Robert. "Security Management." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_42.
Full textDe, Brajesh. "API Security." In API Management. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-1305-6_7.
Full textPerez, André. "Network Management." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch6.
Full textCalles, Miguel A. "Account Management." In Serverless Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6100-2_7.
Full textConference papers on the topic "IT security management"
Harris, Gregory H. "Information security management." In 2009 Information Security Curriculum Development Conference. ACM Press, 2009. http://dx.doi.org/10.1145/1940976.1941006.
Full textModiri, Nasser, and Yosef Masoudi Sobhanzadeh. "Information Security Management." In 2011 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2011. http://dx.doi.org/10.1109/cicn.2011.100.
Full textBosire, Sylvia. "Information security management." In 2009 Information Security Curriculum Development Conference. ACM Press, 2009. http://dx.doi.org/10.1145/1940976.1941000.
Full textPorretti, Claudio, Raoul Lahaije, and Denis Kolev. "A New Vision for ATM Security Management: The Security Management Platform." In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.50.
Full textSingh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Full text"Computer security acquisition management." In 2nd Aerospace Computer Security Conference. American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2774.
Full textKetel, Mohammed. "IT security risk management." In the 46th Annual Southeast Regional Conference. ACM Press, 2008. http://dx.doi.org/10.1145/1593105.1593203.
Full textSingh, Brijendra. "Network security and management." In 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2010. http://dx.doi.org/10.1109/iccic.2010.5705886.
Full textRojanakul, Kittichote, and Hu Liang. "Network security infrastructure management." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234673.
Full text"SESSION FIVE - Security Management." In 2004 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2004. http://dx.doi.org/10.1109/noms.2004.1317660.
Full textReports on the topic "IT security management"
Meyer, Paul. Distributed Network Management Security,. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada325666.
Full textGanger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada465393.
Full textBretzke, John C. Global Security Program Management Plan. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1124631.
Full textFraser, Neil. System and Security Management Tools. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada334986.
Full textMuftic, Sead. Security Management for SE Linux. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada412244.
Full textChoo, Vic, Carol Muehrcke, and Rob Vienneau. Operational Information Management Security Architecture. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada462036.
Full textOshio, Takashi. Social Security and Trust Fund Management. National Bureau of Economic Research, 2004. http://dx.doi.org/10.3386/w10444.
Full textBowen, Sue, editor. Integrated safeguards and security management plan. Office of Scientific and Technical Information (OSTI), 2001. http://dx.doi.org/10.2172/788161.
Full textMeyer, Paul. Internet Draft Distributed Network Management Security,. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada325665.
Full textNewman, Richard, Richard Newman, Eugene E. McPeek, et al. Security and Emergency Management-NMPEA Application. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1561721.
Full text