Добірка наукової літератури з теми "Information and its security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information and its security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Information and its security"
Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Повний текст джерелаPisarenko, I. A. "Information and its security." Automation, Telemechanization and Communication in Oil Industry, no. 1 (2019): 26–29. http://dx.doi.org/10.33285/0132-2222-2019-1(546)-26-29.
Повний текст джерелаDauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.
Повний текст джерелаShumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Повний текст джерелаAslanov, Kadir. "INFORMATION PROTECTION AND ITS TYPES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 9 (2024): 261–72. https://doi.org/10.5281/zenodo.13847530.
Повний текст джерелаPietras, Estera. "Information security – its essence and threats." Scientific Journal of the Military University of Land Forces 191, no. 1 (2019): 26–35. http://dx.doi.org/10.5604/01.3001.0013.2396.
Повний текст джерелаFURASHEV, V. "Information security: indicators." INFORMATION AND LAW, no. 1(7) (March 28, 2013): 143–50. http://dx.doi.org/10.37750/2616-6798.2013.1(7).272262.
Повний текст джерелаMARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.
Повний текст джерелаRhee, Hyeun-Suk, Cheongtag Kim, and Young U. Ryu. "Self-efficacy in information security: Its influence on end users' information security practice behavior." Computers & Security 28, no. 8 (2009): 816–26. http://dx.doi.org/10.1016/j.cose.2009.05.008.
Повний текст джерелаRasulov, Islom Jovli o'g'li. "INFORMATION SECURITY AND ITS ORGANIZERS. RSA ALGORITHM." "Science and Innovation" international scientific journal 1, no. 1 (2022): 181–84. https://doi.org/10.5281/zenodo.6492280.
Повний текст джерелаДисертації з теми "Information and its security"
Chu, Man-ying, and 朱文英. "Information security deviant behavior: its typology, measures, and causes." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48079613.
Повний текст джерелаKanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.
Повний текст джерелаKondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.
Повний текст джерелаThorarensen, Christian. "A Performance Analysis of Intrusion Detection with Snort and Security Information Management." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602.
Повний текст джерелаAlbehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.
Повний текст джерелаTennakoon, Mudiyanselage Hemamali Leelawardana. "The impact of information security and its related constructs on purchase intention of social commerce users." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/34862/.
Повний текст джерелаSalau, Aaron Olaniyi. "Right of access to information and its limitation by national security in Nigeria: mutually inclusive or exclusive?" Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25429.
Повний текст джерелаFattori, A. "HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233326.
Повний текст джерелаPelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.
Повний текст джерелаKelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.
Повний текст джерелаКниги з теми "Information and its security"
Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.
Повний текст джерелаKeith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.
Знайти повний текст джерелаInstitution, British Standards, ed. IMS: Information security. BSi, 2003.
Знайти повний текст джерелаRelia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.
Знайти повний текст джерелаUS GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.
Знайти повний текст джерелаSychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Повний текст джерелаByrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.
Знайти повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.
Знайти повний текст джерелаUnited States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.
Знайти повний текст джерелаSychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.
Повний текст джерелаЧастини книг з теми "Information and its security"
Chow, Sherman S. M. "Verifiable Pairing and Its Applications." In Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_15.
Повний текст джерелаFukushima, Kazuhide, Shinsaku Kiyomoto, Toshiaki Tanaka, and Kouichi Sakurai. "Ternary Subset Difference Method and Its Quantitative Analysis." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_17.
Повний текст джерелаChoudhury, Ashish. "Asynchronous Error-Decodable Secret-Sharing and Its Application." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_22.
Повний текст джерелаLiu, Xin, Willy Susilo, and Joonsang Baek. "Secure Computation of Shared Secrets and Its Applications." In Information Security Applications. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89432-0_10.
Повний текст джерелаGuo, Fuchun, Yi Mu, Willy Susilo, and Vijay Varadharajan. "Membership Encryption and Its Applications." In Information Security and Privacy. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3_15.
Повний текст джерелаIbraimi, Luan, Milan Petkovic, Svetla Nikova, Pieter Hartel, and Willem Jonker. "Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_23.
Повний текст джерелаZhang, Yan, Yuhao Bai, Soojin Lee, Ming Li, and Seung-Hyun Seo. "A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism." In Information Security Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-8024-6_6.
Повний текст джерелаBao, Da, Yuichi Goto, and Jingde Cheng. "Predicting New Attacks for Information Security." In Computer Science and its Applications. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45402-2_188.
Повний текст джерелаPaul, Goutam. "Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_10.
Повний текст джерелаVaradharajan, Vijay, and Thomas Hardjono. "Security Model for Distributed Object Framework and its Applicability to CORBA." In Information Systems Security. Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_38.
Повний текст джерелаТези доповідей конференцій з теми "Information and its security"
Koyama, Hiroki, Shigeaki Tanimoto, Atsushi Shimoda, Seiko Taki, and Atsushi Kanai. "Introduction of Information Security Fatigue Scale for Teleworking and its Effectiveness." In 2024 IEEE/ACIS 9th International Conference on Big Data, Cloud Computing, and Data Science (BCD). IEEE, 2024. http://dx.doi.org/10.1109/bcd61269.2024.10743119.
Повний текст джерелаMieno, Takehiko, Hiroyuki Okazaki, Kenichi Arai, Yuichi Futa, and Hiroaki Yamamoto. "Formal Security Verification for Searchable Symmetric Encryption Using ProVerif." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858210.
Повний текст джерелаFujioka, Atsushi, Keisuke Saito, Taiichi Saito, and Keita Xagawa. "Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858272.
Повний текст джерелаShiraki, Shogo, and Takanori Isobe. "Security Analysis on End-to-End Encryption of Zoom Mail." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858224.
Повний текст джерелаBocharova, Irina, Boris Kudryashov, Vitaly Skachek, and Stefano Alberico. "Enhancement of Physical Layer Security Based on NB LDPC Coded Modulation." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858261.
Повний текст джерелаKim, Yong-tae, Gil-cheol Park, Tai-hoon Kim, and Sang-ho Lee. "Security Evaluation for Information Assurance." In 2007 International Conference on Computational Science and its Applications (ICCSA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccsa.2007.55.
Повний текст джерелаPRATIWI, Aris, Dwi Rosa INDAH, Jaidan JAUHARI, and Mgs Afriyan FIRDAUS. "Security Capability Assessment on Network Monitoring Information System Using COBIT 5 for Information Security." In Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/aisr.k.200424.024.
Повний текст джерелаZou, Yanli, and Ruiqin Bu. "Computer network information security and Its Countermeasures." In 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmcce-17.2017.7.
Повний текст джерелаBlahova, Marta. "Crisis Management and Its Information Software Security." In 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC). IEEE, 2022. http://dx.doi.org/10.1109/cscc55931.2022.00032.
Повний текст джерелаAnjaria, Kushal, and Arun Mishra. "Neuroevolution for effective information security training." In 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp). IEEE, 2017. http://dx.doi.org/10.1109/icsoftcomp.2017.8280078.
Повний текст джерелаЗвіти організацій з теми "Information and its security"
Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.
Повний текст джерелаSerra Hoffman, Joan, Beatriz Abizanda, Suzanne Duryea, and Lina Marmolejo. Citizen Security: Conceptual Framework and Empirical Evidence. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0006935.
Повний текст джерелаTemple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, et al. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.
Повний текст джерелаKim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004195.
Повний текст джерелаSaalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Posture Trends in China, Russia, the United States and the European Union. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/elwl8053.
Повний текст джерелаLatorre, Lucía, Eduardo Riego, Ignacio Cerrato, Jose Daniel Zarate, and Lorenzo De Leo. Tech Report: Generative AI. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013473.
Повний текст джерелаReyero y Aranda, María Rosa. Identification of Institutional Factors in Bank Operations: Flexibility v. Early Detection: Case Studies in the Citizen Security and Transparency Sub-Sectors. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0006789.
Повний текст джерелаLatorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.
Повний текст джерелаBaldwin, Gretchen. The Image and the Perception: Gender-responsive Strategic Communications in EU Civilian CSDP Missions. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/lqlo5040.
Повний текст джерелаBowen, P., J. Hash, and M. Wilson. Information security handbook :. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.
Повний текст джерела