-
1
Costs and benefits of business information security
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
2
Methodology of Creation and Structure of the Corporate Information Security Unit
Published 2022-11-01Subjects: Get full text
Article -
3
Review of domestic and international financial security
Published 2017-02-01Subjects: Get full text
Article -
4
Application of big data technology in enterprise information security management
Published 2025-01-01Subjects: Get full text
Article -
5
Design of multi-key encryption method
Published 2020-11-01Subjects: “…information security…”
Get full text
Article -
6
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
7
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
8
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: “…information security…”
Get full text
Article -
9
Method Framework for Developing Enterprise Architecture Security Principles
Published 2019-10-01Subjects: Get full text
Article -
10
FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY
Published 2016-08-01Subjects: “…information security…”
Get full text
Article -
11
The formal analysis of CC security functional components
Published 2003-01-01Subjects: “…information security…”
Get full text
Article -
12
Analysis and Protection for Information Security Event of Communication Industry User
Published 2013-08-01Subjects: “…information security…”
Get full text
Article -
13
Analysis and Practice of Cloud Computing Information Security
Published 2013-02-01Subjects: Get full text
Article -
14
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01Subjects: Get full text
Article -
15
Preliminary Study on the Security Domain Transformation of SMS Platform
Published 2013-08-01Subjects: Get full text
Article -
16
Review of semantic-based privacy-preserving approaches in LBS
Published 2016-12-01Subjects: “…information security…”
Get full text
Article -
17
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article -
18
Suggestion on establishing curriculum system for information security major
Published 2016-07-01Subjects: “…information security…”
Get full text
Article -
19
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
20
ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
Published 2024-09-01Subjects: Get full text
Article