-
1
VNF lifecycle security management measures in NFV
Published 2016-11-01Subjects: Get full text
Article -
2
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Published 2022-03-01Subjects: Get full text
Article -
3
Analysis on Potential Network Security Risk of LTE Scalable Deployment
Published 2015-12-01Subjects: Get full text
Article -
4
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01Subjects: “…information security management…”
Get full text
Article -
5
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
6
Research and practice on power big data security governance system
Published 2019-11-01Subjects: Get full text
Article -
7
Identity-based domain key distribution protocol in the E-document security management
Published 2012-05-01Subjects: Get full text
Article -
8
USE OF ICT BASED SYSTEMS IN SITE SECURITY MANAGEMENT: A SOUTH AFRICAN STUDY
Published 2014-12-01Subjects: “…ICT, Security systems, site theft, site management, site security management…”
Get full text
Article -
9
Research on the Solution of Business Platform Security
Published 2013-08-01Subjects: Get full text
Article -
10
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
11
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
12
Development of a management model for the provision of long-term care services for elderly and disabled citizens on an extraterritorial basis
Published 2023-05-01Subjects: Get full text
Article -
13
Remote work during the COVID-19 pandemic on the example of the Republic of Kazakhstan: employers’ opinion
Published 2023-03-01Subjects: Get full text
Article -
14
Development of multi-agent information security management system
Published 2022-12-01Subjects: “…information security management systems…”
Get full text
Article