Showing 1 - 10 of 29
This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their...
Persistent link: https://www.econbiz.de/10015100709
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David Lilja. 1 computer file (PDF); x, 108 pages, appendix A. Includes Vita page 106.
Persistent link: https://www.econbiz.de/10009462870
Purpose This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts. Design/methodology/approach A quantitative method research design has been used in this study. This...
Persistent link: https://www.econbiz.de/10014754665
Language is the foundation for any communication and the vocabulary used has a decisive influence on the ability of the communication partners to clearly understand each other. In Information Security Risk Management (ISRM), the terminology used is often dictated by industry standards and...
Persistent link: https://www.econbiz.de/10015185019
Persistent link: https://www.econbiz.de/10013490812
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de/10015135607
Persistent link: https://www.econbiz.de/10009767464
Persistent link: https://www.econbiz.de/10010195897
Persistent link: https://www.econbiz.de/10010462008
Persistent link: https://www.econbiz.de/10010462014