To see the other types of publications on this topic, follow the link: Organizational information security.

Books on the topic 'Organizational information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Organizational information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

1954-, Jennings Dan Wesley, ed. Information assurance: Managing organizational IT security risks. Butterworth-Heinemann, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tipton, Harold F., and Micki Krause Nozaki. Information security management handbook. 4th ed. Auerbach, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McCann, Tiffany. Information security: Keeping data safe. FEI Research Foundation, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Layton, Timothy P. Information security awareness: The psychology behind the technology. AuthorHouse, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Organizational, legal, and technological dimensions of information system administration. Information Science Reference, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

P, Eloff Jan H., ed. Advances in information security management & small systems security: IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. Kluwer Academic Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

It's all about the people: Technology management that overcomes disaffected people, stupid processes, and deranged corporate cultures. CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Publicis Corporate Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kouns, Jake. Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams. Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Thies, Karlheinz H. Management Operationaler IT-Risiken: Methoden fu r eine Risikobewa ltigungsstratgie. Springer Berlin, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Information security architecture: An integrated approach to security organization. Auerbach, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Blokdijk, Gerard. IT risk management guide: Risk management implementation guide, presentations, blueprints, templates : complete risk management toolkit guide for information technology processes and systems. Art of Service, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tudor, Jan Killmeyer. Information security architecture: An integrated approach to security in the organization. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

National Archives and Records Administration organizational issues: Hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 30, 2009. U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Systems, United Nations Advisory Committee for the Co-ordination of Information. Information system security guidelines for the United Nations organizations. United Nations, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

United States. General Accounting Office. Accounting and Information Management Division. Executive guide: Information security management, learning from leading organizations. The Office, Accounting and Information Management Division, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

United States. Congress. House. Committee on Veterans' Affairs. Which VA IT organizational structure would have best prevented VA's "meltdown" in information management: Hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 28, 2006. U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Downey, R. M. Handling of North Atlantic Treaty Organization classified information. Dept. of the Air Force, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Knowledge assets: Securing competitive advantage in the information economy. Oxford University Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Knowledge assets: Securing competitive advantage in the information economy. Oxford University Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

NATO, Advanced Research Workshop on Future NATO Security (2003 Prague Czech Republic). Future NATO security: Addressing the challenges of evolving security and information sharing systems and architectures. IOS Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lobanov, Aleksey. Medical and biological bases of safety. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1439619.

Full text
Abstract:
The textbook considers the subject and tasks of the discipline, highlights the medical and biological foundations of ensuring human security in the conditions of natural, man-made and biological-social emergencies, as well as when using modern weapons of destruction by a probable enemy. 
 Briefly, but quite informative, the structure of the human body and the basics of its functioning are described. The specificity and mechanism of the toxic effect of harmful substances on a person, the energy effect and the combined effect of the main damaging factors of the sources of emergency situatio
APA, Harvard, Vancouver, ISO, and other styles
27

service), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Schneier, Bruce. Economics of Information Security and Privacy III. Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

D, Collette Ronald, and Gentile Skye, eds. CISO soft skills: Securing organizations impaired by employee politics, apathy, and intolerant perspectives. Auerbach Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Blinovskaya, Yana, and Dar'ya Zadoya. Geoinformation systems in technosphere security. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1002663.

Full text
Abstract:
The textbook considers the specifics of the use of information technologies in technosphere security. The article describes the characteristics of software products used to solve problems in the areas of life safety, organization of industrial production and environmental protection. 
 Meets the requirements of the federal state educational standards of higher education of the latest generation.
 For students studying in the enlarged group of training areas 20.00.00 "Technosphere safety and environmental management", as well as for students of related specialties studying the impact
APA, Harvard, Vancouver, ISO, and other styles
31

Joint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. JSOU Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lobanov, Aleksey. Biomedical foundations of security. INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.

Full text
Abstract:
The textbook discusses the threats and risks to life and health of people in post-industrial society. The role and place of medical and biological technologies in the system of ensuring the safety of the population of the Russian Federation are shown from the standpoint of an interdisciplinary approach. 
 Briefly, but quite informative, the structure of the human body and the principles of its functioning are described. The specificity and mechanism of toxic effects on humans of harmful substances, energy effects and combined action of the main damaging factors of sources of emergency sit
APA, Harvard, Vancouver, ISO, and other styles
33

Ronfeldt, David F. North America in the era of citizen networks: State, society, and security. RAND, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

service), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Trusted guardian: Information sharing and the future of the Atlantic Alliance. Ashgate, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Holger, Ehmke, and Lang Paul, eds. Frieden und Sicherheit als Herausforderung: Informationen und Argumente. 2nd ed. Bundeszentrale für Politische Bildung, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Information sharing in the era of WikiLeaks: Balancing security and collaboration : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate of the One Hundred Twelfth Congress, first session, March 10, 2011. U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cybersecurity: Emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement. Cybersecurity: Emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ben, Smyth, Wang Guilin 1925-2009, and SpringerLink (Online service), eds. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Office, General Accounting. NATO enlargement: Report is responsive to Senate requirements, but additional information could be useful : report to congressional committees. U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Federal information security: Current challenges and future policy considerations : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, second session, March 24, 2010. U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Securing American sovereignty: A review of the United States' relationship with the WTO : hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session July 15, 2005. U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Károly, Farkas, Schmidt Andreas U, Lioy Antonio 1958-, Russello Giovanni, Luccio Flaminia L, and SpringerLink (Online service), eds. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Roshan, Pais Alwyn, Chandrasekaran K, Balakrishnan N, and SpringerLink (Online service), eds. Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Anupam, Datta, Etalle Sandro, and SpringerLink (Online service), eds. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Daji, Qiao, and SpringerLink (Online service), eds. Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

The state of federal information security: Hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 19, 2009. U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

United, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!