Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Information and its security.

Книги з теми "Information and its security"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 книг для дослідження на тему "Information and its security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Keith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Institution, British Standards, ed. IMS: Information security. BSi, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Relia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

US GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.

Повний текст джерела
Анотація:
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems".
 Meets the requirements of Federal state educational standards of higher education of the latest generation.
 The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of tra
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Byrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

United States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

United States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.

Повний текст джерела
Анотація:
The textbook is intended for training in the following disciplines: "Fundamentals of information security", "Information security", "Information security", "Threats to information security", "Malicious programs", "Antivirus programs", "Information security standards", "Technology for building secure automated systems". There are control questions for each chapter, a glossary, a list of topics for abstracts, tests with answers are given at the end. The presented material was tested in the classroom at the Plekhanov Russian University of Economics.
 Meets the requirements of the federal sta
Стилі APA, Harvard, Vancouver, ISO та ін.
11

United States. Department of Homeland Security. Office of Inspector General. Improvements necessary in DHS' security program and practices for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

United States. Department of Homeland Security. Office of Inspector General. DHS has made improvements on the security program for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

B, Rudman Warren, and United States President, eds. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy. The Board, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Red'kina, Natal'ya. Fundamentals of information culture and information security. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/1915784.

Повний текст джерела
Анотація:
The textbook is devoted to the most important pedagogical problem related to the development of personal information culture in the process of transformation of the information society and the socio-cultural environment, the emergence of information threats and the impact of information and communication technologies on all spheres of human activity and information needs of users. It covers a wide range of issues related to understanding the role of information in society and the phenomenon of information culture. Modern trends in the development of the information society, legal, technical an
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Derbin, Evgeniy, and Anatoliy Caregorodcev. Information warfare: conceptual foundations of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2084342.

Повний текст джерела
Анотація:
The textbook contains lecture materials on the academic discipline "Fundamentals of information warfare", executed in the form of an atlas of basic diagrams representing the content of the issues under consideration in a form convenient for perception and understanding of the interrelationships of all processes and phenomena.
 It may be of interest both for employees of departments whose activities are related to ensuring information security of credit and financial sector organizations, and for teachers, students and postgraduates studying in training areas and specialties related to an
Стилі APA, Harvard, Vancouver, ISO та ін.
16

1957-, Cobb Michael, ed. IIS security. McGraw-Hill/Osborne, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

United States. Department of Homeland Security. Office of Inspector General. DHS can take actions to address its additional cybersecurity responsibilities. Department of Homeland Security, Office of Inspector General, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Gene, Aloise, ed. Information security: National Nuclear Security Administration needs to improve contingency planning for its classified supercomputing operations : report to congressional requesters. U.S. Govt. Accountability Office, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Повний текст джерела
Анотація:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
Стилі APA, Harvard, Vancouver, ISO та ін.
20

United States. Department of Homeland Security. Office of Inspector General. DHS needs to address challenges to its financial systems consolidation initiative. U.S. Dept. of Homeland Security, Office of Inspector General, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Office, General Accounting. Information security: USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives. The Office, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Dale, Kutnick, ed. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

McLaughlin, Keith. Internet banking in Ireland: Are we securing its existence. University College Dublin, Graduate School of Business, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

United States. National Aeronautics and Space Administration. Office of Audits. NASA's management of its smartphones, tablets, and other mobile devices. National Aeronautics and Space Administration, Office of Inspector General, Office of Audits, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Office, General Accounting. Industrial security: DOD cannot provide adequate assurances that its oversight ensures the protection of classified information : report to the Committee on Armed Services, U.S. Senate. U.S. General Accounting Office, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

International Conference on Information Security and Assurance (3rd : 2009 : Seoul, Korea), ed. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Park, Jong Hyuk, and Jong Hyuk Park. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Sychev, Yuriy. Information security standards. Protection and processing of confidential documents. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942679.

Повний текст джерела
Анотація:
The textbook covers all Russian and major international information security standards in force according to Rosstandart. After each chapter there are control questions; at the end there is a list of topics for abstracts and verification tests with answers.
 Meets the requirements of the federal state educational standards of secondary vocational education of the latest generation.
 It is intended for students studying the disciplines "Information security standards", "Information security", "Information protection". It will be useful for specialists working in the field of informati
Стилі APA, Harvard, Vancouver, ISO та ін.
29

United States. Department of Homeland Security. Office of Inspector General. DHS needs to manage its radio communication program better. Department of Homeland Security, Office of Inspector General, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Caregorodcev, Anatoliy, Sergey Romanovskiy, and Sergey Volkov. Risk analysis in the processes of ensuring information security of the life cycle of financial automated information systems. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2049718.

Повний текст джерела
Анотація:
One of the key elements of the development strategy of a modern organization is the solution of the task of transforming the information security risk management system. Today, more and more modern organizations are moving away from the maturity-based model in favor of a risk-based approach. The monograph examines this approach and provides recommendations for its application in credit and financial organizations.
 It may be of interest both for employees of departments whose activities are related to risk analysis and management, credit and financial organizations, and for teachers, stud
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Office, General Accounting. Document security: Justice can improve its controls over classified and sensitive documents : report to the Chairman, Information, Justice, Transportation and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Office, General Accounting. Nuclear security: DOE's progress on reducing its security clearance work load : report to the Chairman, Committee on Government Operations, House of Representatives. The Office, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

John, Mueller. Microsoft IIS 7 Implementation and Administration. John Wiley & Sons, Ltd., 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

B, Rudman Warren, and United States. President's Foreign Intelligence Advisory Board., eds. The Rudman report: Science at its best, security at its worst : hearing before the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, June 22, 1999. U.S. G.P.O., 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Novosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.

Повний текст джерела
Анотація:
The object of study in the monograph is the conflict "information security system of infocommunication networks of critical socio-economic infrastructure objects — an attacker (criminal element)". The subject of the research is the development of a methodology for conflict-active project management for the development of information security systems for these networks, including models for supporting project decision-making. The theoretical basis of the above is the provisions of system analysis, the theory of management and decision-making, the theory of active systems, the theory of informat
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Polischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.

Повний текст джерела
Анотація:
The tutorial is devoted to the implementation of relational databases. Its purpose is to master the basic principles of design, implementation, maintenance and information security of databases. The manual includes tasks for laboratory work, control questions and tests for self-examination.
 Meets the requirements of the Federal state educational standards of higher education of the last generation.
 For students of higher educational institutions of all specialties and areas of training, interested in the design, implementation and security of databases.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Office, General Accounting. Information technology: FBI needs an enterprise architecture to guide its modernization activities : report to congressional requesters. U.S. General Accounting Office, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Office, General Accounting. Information security: IRS electronic filing systems : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Attorney-General, United States, ed. Information technology: INS needs to better manage the development of its enterprise architecture : report to the Attorney General, Department of Justice. The Office, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

shih, Taiwan) Workshop on Cryptology and Information Security (1998 Tʻai-nan. Proceedings of Workshop on Cryptology and Information Security: International Computer Symposium (ICS '98) : National Cheng Kung University : Tainan, Taiwan, R.O.C. : December 17-19, 1998. National Cheng Kung University, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Oreshina, Marina, and Andrey Garnov. Information management technologies in the context of digital transformation. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2186397.

Повний текст джерела
Анотація:
The textbook provides a general description of the processes of collecting, transmitting, and storing information using information management systems in organizations and enterprises, and discusses information processing methods and tools, including data visualization using the Yandex DataLens service. The creation of a complex of interrelated models of information processes is considered, the development of methods that allow automated solutions to various problems of an applied nature is presented, ways and means of implementing information technologies are shown: methodological, informatio
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Office, General Accounting. Homeland security: INS cannot locate many aliens because it lacks reliable address information : report to congressional requesters. U.S. GAO, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Office, United States Government Accountability. Nuclear security: DOE needs better information to guide its expanded recovery of sealed radiological sources : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. U.S. Government Accountability Office, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

United States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

United States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Cryptography and Its Applications in Information Security. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-3768-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Cyberwarfare and its impact on international security. United Nations, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Social security and its users: From red tape to information access. International Social Security Association, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Alexander, Philip. Information Security. www.praeger.com, 2008. http://dx.doi.org/10.5040/9798400670206.

Повний текст джерела
Анотація:
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a pr
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!