Books on the topic 'Organizational information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Organizational information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1954-, Jennings Dan Wesley, ed. Information assurance: Managing organizational IT security risks. Butterworth-Heinemann, 2002.
Find full textTipton, Harold F., and Micki Krause Nozaki. Information security management handbook. 4th ed. Auerbach, 2002.
Find full textMcCann, Tiffany. Information security: Keeping data safe. FEI Research Foundation, 2002.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textLayton, Timothy P. Information security awareness: The psychology behind the technology. AuthorHouse, 2005.
Find full textOrganizational, legal, and technological dimensions of information system administration. Information Science Reference, 2014.
Find full textP, Eloff Jan H., ed. Advances in information security management & small systems security: IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. Kluwer Academic Publishers, 2001.
Find full textIt's all about the people: Technology management that overcomes disaffected people, stupid processes, and deranged corporate cultures. CRC Press, 2012.
Find full textWiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Publicis Corporate Pub., 2004.
Find full textKouns, Jake. Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams. Wiley, 2010.
Find full textThies, Karlheinz H. Management Operationaler IT-Risiken: Methoden fu r eine Risikobewa ltigungsstratgie. Springer Berlin, 2008.
Find full textInformation security architecture: An integrated approach to security organization. Auerbach, 2001.
Find full textBlokdijk, Gerard. IT risk management guide: Risk management implementation guide, presentations, blueprints, templates : complete risk management toolkit guide for information technology processes and systems. Art of Service, 2008.
Find full textTudor, Jan Killmeyer. Information security architecture: An integrated approach to security in the organization. Auerbach Publications, 2006.
Find full textNational Archives and Records Administration organizational issues: Hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 30, 2009. U.S. G.P.O., 2010.
Find full textSystems, United Nations Advisory Committee for the Co-ordination of Information. Information system security guidelines for the United Nations organizations. United Nations, 1992.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Executive guide: Information security management, learning from leading organizations. The Office, Accounting and Information Management Division, 1998.
Find full textUnited States. Congress. House. Committee on Veterans' Affairs. Which VA IT organizational structure would have best prevented VA's "meltdown" in information management: Hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 28, 2006. U.S. G.P.O., 2007.
Find full textDowney, R. M. Handling of North Atlantic Treaty Organization classified information. Dept. of the Air Force, 1988.
Find full textKnowledge assets: Securing competitive advantage in the information economy. Oxford University Press, 1998.
Find full textKnowledge assets: Securing competitive advantage in the information economy. Oxford University Press, 1999.
Find full textNATO, Advanced Research Workshop on Future NATO Security (2003 Prague Czech Republic). Future NATO security: Addressing the challenges of evolving security and information sharing systems and architectures. IOS Press, 2003.
Find full textLobanov, Aleksey. Medical and biological bases of safety. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1439619.
Full textservice), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. Springer London, 2013.
Find full textSchneier, Bruce. Economics of Information Security and Privacy III. Springer New York, 2013.
Find full textD, Collette Ronald, and Gentile Skye, eds. CISO soft skills: Securing organizations impaired by employee politics, apathy, and intolerant perspectives. Auerbach Publications, 2009.
Find full textBlinovskaya, Yana, and Dar'ya Zadoya. Geoinformation systems in technosphere security. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1002663.
Full textJoint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. JSOU Press, 2008.
Find full textLobanov, Aleksey. Biomedical foundations of security. INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.
Full textRonfeldt, David F. North America in the era of citizen networks: State, society, and security. RAND, 1995.
Find full textservice), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textTrusted guardian: Information sharing and the future of the Atlantic Alliance. Ashgate, 2008.
Find full textHolger, Ehmke, and Lang Paul, eds. Frieden und Sicherheit als Herausforderung: Informationen und Argumente. 2nd ed. Bundeszentrale für Politische Bildung, 1985.
Find full textInformation sharing in the era of WikiLeaks: Balancing security and collaboration : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Twelfth Congress, first session, March 10, 2011. U.S. G.P.O., 2012.
Find full textCybersecurity: Emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. U.S. G.P.O., 2010.
Find full textUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement. Cybersecurity: Emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. U.S. G.P.O., 2010.
Find full textBen, Smyth, Wang Guilin 1925-2009, and SpringerLink (Online service), eds. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textOffice, General Accounting. NATO enlargement: Report is responsive to Senate requirements, but additional information could be useful : report to congressional committees. U.S. General Accounting Office, 2003.
Find full textFederal information security: Current challenges and future policy considerations : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, second session, March 24, 2010. U.S. G.P.O., 2011.
Find full textSecuring American sovereignty: A review of the United States' relationship with the WTO : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session July 15, 2005. U.S. G.P.O., 2006.
Find full textKároly, Farkas, Schmidt Andreas U, Lioy Antonio 1958-, Russello Giovanni, Luccio Flaminia L, and SpringerLink (Online service), eds. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textRoshan, Pais Alwyn, Chandrasekaran K, Balakrishnan N, and SpringerLink (Online service), eds. Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textAnupam, Datta, Etalle Sandro, and SpringerLink (Online service), eds. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textDaji, Qiao, and SpringerLink (Online service), eds. Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textThe state of federal information security: Hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 19, 2009. U.S. G.P.O., 2010.
Find full textUnited, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. U.S. G.P.O., 2009.
Find full textReassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. U.S. G.P.O., 2009.
Find full text