Книги з теми "Information and its security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Information and its security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.
Повний текст джерелаKeith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.
Знайти повний текст джерелаInstitution, British Standards, ed. IMS: Information security. BSi, 2003.
Знайти повний текст джерелаRelia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.
Знайти повний текст джерелаUS GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.
Знайти повний текст джерелаSychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Повний текст джерелаByrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.
Знайти повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.
Знайти повний текст джерелаUnited States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.
Знайти повний текст джерелаSychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.
Повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. Improvements necessary in DHS' security program and practices for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.
Знайти повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. DHS has made improvements on the security program for its intelligence systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2011.
Знайти повний текст джерелаB, Rudman Warren, and United States President, eds. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy. The Board, 1999.
Знайти повний текст джерелаRed'kina, Natal'ya. Fundamentals of information culture and information security. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/1915784.
Повний текст джерелаDerbin, Evgeniy, and Anatoliy Caregorodcev. Information warfare: conceptual foundations of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2084342.
Повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. DHS can take actions to address its additional cybersecurity responsibilities. Department of Homeland Security, Office of Inspector General, 2013.
Знайти повний текст джерелаGene, Aloise, ed. Information security: National Nuclear Security Administration needs to improve contingency planning for its classified supercomputing operations : report to congressional requesters. U.S. Govt. Accountability Office, 2010.
Знайти повний текст джерелаMaksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. DHS needs to address challenges to its financial systems consolidation initiative. U.S. Dept. of Homeland Security, Office of Inspector General, 2010.
Знайти повний текст джерелаOffice, General Accounting. Information security: USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives. The Office, 2000.
Знайти повний текст джерелаDale, Kutnick, ed. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.
Знайти повний текст джерелаMcLaughlin, Keith. Internet banking in Ireland: Are we securing its existence. University College Dublin, Graduate School of Business, 1998.
Знайти повний текст джерелаUnited States. National Aeronautics and Space Administration. Office of Audits. NASA's management of its smartphones, tablets, and other mobile devices. National Aeronautics and Space Administration, Office of Inspector General, Office of Audits, 2014.
Знайти повний текст джерелаOffice, General Accounting. Industrial security: DOD cannot provide adequate assurances that its oversight ensures the protection of classified information : report to the Committee on Armed Services, U.S. Senate. U.S. General Accounting Office, 2004.
Знайти повний текст джерелаInternational Conference on Information Security and Assurance (3rd : 2009 : Seoul, Korea), ed. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.
Знайти повний текст джерелаPark, Jong Hyuk, and Jong Hyuk Park. Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings. Springer, 2009.
Знайти повний текст джерелаSychev, Yuriy. Information security standards. Protection and processing of confidential documents. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942679.
Повний текст джерелаUnited States. Department of Homeland Security. Office of Inspector General. DHS needs to manage its radio communication program better. Department of Homeland Security, Office of Inspector General, 2013.
Знайти повний текст джерелаCaregorodcev, Anatoliy, Sergey Romanovskiy, and Sergey Volkov. Risk analysis in the processes of ensuring information security of the life cycle of financial automated information systems. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2049718.
Повний текст джерелаOffice, General Accounting. Document security: Justice can improve its controls over classified and sensitive documents : report to the Chairman, Information, Justice, Transportation and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1993.
Знайти повний текст джерелаOffice, General Accounting. Nuclear security: DOE's progress on reducing its security clearance work load : report to the Chairman, Committee on Government Operations, House of Representatives. The Office, 1993.
Знайти повний текст джерелаJohn, Mueller. Microsoft IIS 7 Implementation and Administration. John Wiley & Sons, Ltd., 2007.
Знайти повний текст джерелаB, Rudman Warren, and United States. President's Foreign Intelligence Advisory Board., eds. The Rudman report: Science at its best, security at its worst : hearing before the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, June 22, 1999. U.S. G.P.O., 1999.
Знайти повний текст джерелаNovosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.
Повний текст джерелаPolischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Повний текст джерелаOffice, General Accounting. Information technology: FBI needs an enterprise architecture to guide its modernization activities : report to congressional requesters. U.S. General Accounting Office, 2003.
Знайти повний текст джерелаOffice, General Accounting. Information security: IRS electronic filing systems : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 2001.
Знайти повний текст джерелаAttorney-General, United States, ed. Information technology: INS needs to better manage the development of its enterprise architecture : report to the Attorney General, Department of Justice. The Office, 2000.
Знайти повний текст джерелаshih, Taiwan) Workshop on Cryptology and Information Security (1998 Tʻai-nan. Proceedings of Workshop on Cryptology and Information Security: International Computer Symposium (ICS '98) : National Cheng Kung University : Tainan, Taiwan, R.O.C. : December 17-19, 1998. National Cheng Kung University, 1998.
Знайти повний текст джерелаOreshina, Marina, and Andrey Garnov. Information management technologies in the context of digital transformation. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2186397.
Повний текст джерелаOffice, General Accounting. Homeland security: INS cannot locate many aliens because it lacks reliable address information : report to congressional requesters. U.S. GAO, 2002.
Знайти повний текст джерелаOffice, United States Government Accountability. Nuclear security: DOE needs better information to guide its expanded recovery of sealed radiological sources : report to the Chairman, Committee on Energy and Natural Resources, U.S. Senate. U.S. Government Accountability Office, 2005.
Знайти повний текст джерелаUnited States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.
Знайти повний текст джерелаUnited States. General Accounting Office., ed. Department of Energy: DOE needs to improve controls over foreign visitors to its weapons laboratories : statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, before the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, House of Representatives. The Office, 1998.
Знайти повний текст джерелаCryptography and Its Applications in Information Security. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-3768-9.
Повний текст джерелаCyberwarfare and its impact on international security. United Nations, 2009.
Знайти повний текст джерелаClassified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.
Знайти повний текст джерелаSocial security and its users: From red tape to information access. International Social Security Association, 1993.
Знайти повний текст джерелаAlexander, Philip. Information Security. www.praeger.com, 2008. http://dx.doi.org/10.5040/9798400670206.
Повний текст джерела