Information security
![Ministry of Defence](https://upload.wikimedia.org/wikipedia/commons/a/a1/Posters_for_information_security_for_the_Ministry_of_Defense_of_the_Russian_Federation.jpg)
To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on passwords, antivirus software, firewalls, encryption software, legal liability, security awareness and training, and so forth. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred, and destroyed. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement is not adopted. Provided by Wikipedia
Showing 1 - 20 results of 109 for search 'Information Security', query time: 0.29s
Refine Results
-
1by Information Security
Published 2008Call Number: Loading...Connect to this electronic resource
Located:Loading...
eBook -
2by Sutton, David (Information security practitioner)
Published 2018Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
eBook -
3by Alexander, David (Information security practitioner)Other Authors: “...Sutton, David (Information security practitioner)...”
Published 2013
Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
eBook -
4by Sutton, David (Information security practitioner)
Published 2022Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
eBook -
5by Osborne, Mark (Chief information security officer)
Published 2006Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
eBook -
6by Taylor, Andy (Information assurance expert), Alexander, David (Information security practitioner), Finch, Amanda (Computer scientist), Sutton, David
Published 2020Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
eBook -
7Published 2005“...ISC (Conference : Information security) Singapore)...”
Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
Conference Proceeding eBook -
8
Call Number: Loading...
Located:Loading...Government Document Microform Serial Loading... -
9Published 1996“...United States. Information Security Oversight Office...”
Call Number: Loading...
Located:Loading...Government Document Book Loading... -
10Published 1995“...United States. Information Security Oversight Office...”
Call Number: Loading...
Located:Loading...Government Document Book Loading... -
11Published 2001“...ISC (Conference : Information security) Málaga, Spain)...”
Call Number: Loading...
Located:Loading...Conference Proceeding Book Loading... -
12
Call Number: Loading...Get full text
Located:Loading...
Government Document Serial -
13Published 1999“...United States. Information Security Oversight Office...”
Call Number: Loading...
Located:Loading...Government Document Microform Book Loading... -
14
Call Number: Loading...Get full text
Located:Loading...
Government Document Serial -
15Published 2003“...ISC (Conference : Information security) Bristol, England)...”
Call Number: Loading...Get full text
Located:Loading...
Conference Proceeding eBook -
16Published 2006“...ISC (Conference : Information security) Samos, Greece)...”
Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
Conference Proceeding Book -
17Published 2007“...United States. Information Security Oversight Office...”
Call Number: Loading...Get full text
Located:Loading...
Government Document eBook -
18Published 2009“...WISA (Workshop : Information security) Pusan, Korea)...”
Call Number: Loading...Connect to the full text of this electronic book
Located:Loading...
Conference Proceeding eBook -
19Published 1998“...ISW (Workshop : Information security) Ishikawa-shi, Japan)...”
Call Number: Loading...
Located:Loading...Conference Proceeding Book Loading... -
20Published 2000“...ISW (Workshop : Information security) Wollongong, N.S.W.)...”
Call Number: Loading...
Located:Loading...Conference Proceeding Book Loading...
Search Tools:
RSS Feed
–
Email Search
Related Subjects
Computer security
Data protection
Access control
Computer networks
Security measures
Computers
Cryptography
Data encryption (Computer science)
Sécurité informatique
International cooperation
Management
Security classification (Government documents)
Electronic commerce
Business enterprises
Cryptographie
Datensicherung
Information technology
Computerbeveiliging
Congrès
Information storage and retrieval systems
Mesures
Mesures de sûreté
National security
Privacy, Right of
Systèmes informatiques
Sécurité
Ubiquitous computing
authentification
Accès
Biometrie