Статті в журналах з теми "Information and its security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Information and its security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Повний текст джерелаPisarenko, I. A. "Information and its security." Automation, Telemechanization and Communication in Oil Industry, no. 1 (2019): 26–29. http://dx.doi.org/10.33285/0132-2222-2019-1(546)-26-29.
Повний текст джерелаDauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.
Повний текст джерелаShumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Повний текст джерелаAslanov, Kadir. "INFORMATION PROTECTION AND ITS TYPES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 9 (2024): 261–72. https://doi.org/10.5281/zenodo.13847530.
Повний текст джерелаPietras, Estera. "Information security – its essence and threats." Scientific Journal of the Military University of Land Forces 191, no. 1 (2019): 26–35. http://dx.doi.org/10.5604/01.3001.0013.2396.
Повний текст джерелаFURASHEV, V. "Information security: indicators." INFORMATION AND LAW, no. 1(7) (March 28, 2013): 143–50. http://dx.doi.org/10.37750/2616-6798.2013.1(7).272262.
Повний текст джерелаMARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.
Повний текст джерелаRhee, Hyeun-Suk, Cheongtag Kim, and Young U. Ryu. "Self-efficacy in information security: Its influence on end users' information security practice behavior." Computers & Security 28, no. 8 (2009): 816–26. http://dx.doi.org/10.1016/j.cose.2009.05.008.
Повний текст джерелаRasulov, Islom Jovli o'g'li. "INFORMATION SECURITY AND ITS ORGANIZERS. RSA ALGORITHM." "Science and Innovation" international scientific journal 1, no. 1 (2022): 181–84. https://doi.org/10.5281/zenodo.6492280.
Повний текст джерелаGUO, Zhenyuan. "Computer Network Information Security and Its Protection." Theory and Practice of Science and Technology 1, no. 3 (2020): 109–12. http://dx.doi.org/10.47297/taposatwsp2633-456918.20200103.
Повний текст джерелаATC. "INFORMATION CENTRIC NETWORKS AND ITS SECURITY CHALLENGES." Journal of Data Acquistion an Processing 38, no. 3 (2023): 5160–83. https://doi.org/10.5281/zenodo.14333572.
Повний текст джерелаЛихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (2012): 70–73. http://dx.doi.org/10.12737/162.
Повний текст джерелаAvdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Vera Vladimirovna Smirnova, Ilya Mihajlovich Rassolov, and Maria Alekseevna Khvatova. "Improvement of Information Technology and Its Impact on Information Security." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 15–21. http://dx.doi.org/10.46338/ijetae1121_02.
Повний текст джерелаMarczyk, Maciej, and Marek Błachut. "Information security as part of Poland’s security." Scientific Journal of the Military University of Land Forces 206, no. 4 (2022): 609–23. http://dx.doi.org/10.5604/01.3001.0016.1767.
Повний текст джерелаGorbunov, Igor' Andreevich. "Information security: international legal aspects of its provision." Международное право, no. 1 (January 2024): 29–38. http://dx.doi.org/10.25136/2644-5514.2024.1.70440.
Повний текст джерелаAbdugafforovich, Abdullaev Sharof. "Information Security: Modern Realities." European Journal of Higher Education and Academic Advancement 1, no. 2 (2023): 120–23. http://dx.doi.org/10.61796/ejheaa.v1i2.111.
Повний текст джерелаSaadat, Maryam, and Muhammad Umar Abbasi. "Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems." Global International Relations Review IV, no. III (2021): 22–30. http://dx.doi.org/10.31703/girr.2021(iv-iii).04.
Повний текст джерелаBespalov, D. N., and M. A. Kazakov. "Information Warfare, Threats and Information Security." MGIMO Review of International Relations, no. 6(39) (December 28, 2014): 82–87. http://dx.doi.org/10.24833/2071-8160-2014-6-39-82-87.
Повний текст джерелаHedin, Daniel, Luciano Bello, and Andrei Sabelfeld. "Information-flow security for JavaScript and its APIs." Journal of Computer Security 24, no. 2 (2016): 181–234. http://dx.doi.org/10.3233/jcs-160544.
Повний текст джерелаLi, Yue, Haining Wang, and Kun Sun. "Personal Information in Passwords and Its Security Implications." IEEE Transactions on Information Forensics and Security 12, no. 10 (2017): 2320–33. http://dx.doi.org/10.1109/tifs.2017.2705627.
Повний текст джерелаIbrahimova, Aytakin Nazim. "The defintions of information and security; history of information security development." Vilnius University Open Series, no. 6 (December 28, 2020): 48–57. http://dx.doi.org/10.15388/os.law.2020.5.
Повний текст джерелаЕршова, Е. Е. "Information security as an element of economic security." Management of Education, no. 6(52) (June 30, 2022): 225–30. http://dx.doi.org/10.25726/v8343-7232-2832-p.
Повний текст джерелаGrabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.
Повний текст джерелаMohamad Noorman Masrek, Tri Soesantari, Asad Khan, and Aang Kisnu Dermawan. "Examining the Relationship between Information Security Effectiveness and Information Security Threats." International Journal of Business and Society 21, no. 3 (2021): 1203–14. http://dx.doi.org/10.33736/ijbs.3335.2020.
Повний текст джерелаAhmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.
Повний текст джерелаYusupjanovich, Sharibayev Nosir, Djurayev Sherzod Sobirjonovich, Tursunov Axrorbek Aminjon o‘g‘li, and Sharifbayev Raximjon Nosir o‘g‘li. "ASSESSMENT OF COMPLIANCE WITH INFORMATION SECURITY REQUIREMENTS VIA SECUBE." American Journal of Applied Sciences 5, no. 12 (2023): 16–18. http://dx.doi.org/10.37547/tajas/volume05issue12-04.
Повний текст джерелаE. N., Uspenskiy, Norkina A. N., Myseva E. R., and Chicherov K. A. "Economic Aspects of Information Security." KnE Social Sciences 3, no. 2 (2018): 170. http://dx.doi.org/10.18502/kss.v3i2.1539.
Повний текст джерелаYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Повний текст джерелаPérez-González, Daniel, Sara Trigueros Preciado, and Pedro Solana-Gonzalez. "Organizational practices as antecedents of the information security management performance." Information Technology & People 32, no. 5 (2019): 1262–75. http://dx.doi.org/10.1108/itp-06-2018-0261.
Повний текст джерелаVoronina, Anastasia A., and Irina I. Skripina. "Preventing information security incidents." Research Result Information Technologies 6, no. 3 (2021): 20–25. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-3.
Повний текст джерелаVoronina, Anastasia A., and Irina I. Skripina. "Preventing information security incidents." Research Result Information Technologies 6, no. 3 (2021): 20–25. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-3.
Повний текст джерелаGałecki, Andrzej. "Contemporary Conditions of Information Security." System Safety: Human - Technical Facility - Environment 3, no. 1 (2021): 289–95. http://dx.doi.org/10.2478/czoto-2021-0030.
Повний текст джерелаDOVHAN, O. "Modern information structures as components of information security." INFORMATION AND LAW, no. 2(14) (August 19, 2015): 111–20. http://dx.doi.org/10.37750/2616-6798.2015.2(14).272705.
Повний текст джерелаКаримов, Х. Т., В. А. Андрианов, В. Н. Пермяков, Л. М. Тархова, and В. Г. Урманов. "Information security as a path to information systems efficiency." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 4 (December 29, 2023): 108–15. http://dx.doi.org/10.18137/rnu.v9187.23.04.p.108.
Повний текст джерелаHung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. J. Hinek. "Dual RSA and Its Security Analysis." IEEE Transactions on Information Theory 53, no. 8 (2007): 2922–33. http://dx.doi.org/10.1109/tit.2007.901248.
Повний текст джерелаAxmetov Rustam Dilshotovich. "Cyber Security and its Fundamentals." European Multidisciplinary Journal of Modern Science 26, no. 1 (2024): 8–12. http://dx.doi.org/10.51699/emjms.v26i1.1094.
Повний текст джерелаTayyaba Sultana, Tayyaba Sultana. "Information Security with Cryptography." International Journal for Electronic Crime Investigation 2, no. 1 (2018): 6. http://dx.doi.org/10.54692/ijeci.2018.02019.
Повний текст джерелаChurilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.
Повний текст джерелаАверченкова, Елена, Elena Averchenkova, Д. Гончаров, D. Goncharov, Дмитрий Лысов, and Dmitriy Lysov. "MODEL OF INFORMATION SECURITY OF INFORMATION ADVISING SY." Bulletin of Bryansk state technical university 2016, no. 4 (2016): 251–61. http://dx.doi.org/10.12737/23243.
Повний текст джерелаNowrin, Shohana, and David Bawden. "Information security behaviour of smartphone users." Information and Learning Science 119, no. 7/8 (2018): 444–55. http://dx.doi.org/10.1108/ils-04-2018-0029.
Повний текст джерелаTeymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.
Повний текст джерелаSom, Zoltán, and Tamás Szádeczky. "The legend of information security." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 385–98. http://dx.doi.org/10.24989/ocg.v325.32.
Повний текст джерелаZhestovskii, Aleksandr Georgievich, Denis Yaroslavovich Okolot, and Igor Davidovich Rudinskiy. "Marine Specialist’s Information Security Culture and Its Formation Conditions." Pedagogika. Voprosy teorii i praktiki, no. 1 (January 2022): 100–107. http://dx.doi.org/10.30853/ped20220010.
Повний текст джерелаCooper, Martin. "BCS Information Security Specialist Group Celebrates its 40th Anniversary." ITNOW 65, no. 2 (2023): 8–11. http://dx.doi.org/10.1093/combul/bwad041.
Повний текст джерелаRusetskaya, Irina A. "COMPLIANCE IN INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2023): 70–80. http://dx.doi.org/10.28995/2686-679x-2023-2-70-80.
Повний текст джерелаSohrabi Safa, Nader, Carsten Maple, Tim Watson, and Steve Furnell. "Information security collaboration formation in organisations." IET Information Security 12, no. 3 (2018): 238–45. http://dx.doi.org/10.1049/iet-ifs.2017.0257.
Повний текст джерелаSeehusen, F., and K. Stølen. "Information flow security, abstraction and composition." IET Information Security 3, no. 1 (2009): 9–33. http://dx.doi.org/10.1049/iet-ifs:20080069.
Повний текст джерелаEverett, Cath. "Microsoft bares its security teeth." Infosecurity 4, no. 1 (2007): 26–28. http://dx.doi.org/10.1016/s1754-4548(07)70016-5.
Повний текст джерелаKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Повний текст джерела