نتایج جستجو
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES)
Charles A. Shoniregun (auth.), 2005
Information Security Risk Analysis
Thomas R. Peltier, 2005
Information Security Risk Analysis
Thomas R. Peltier, 2001
Information Security Risk Analysis
Thomas R. Peltier, 2010
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Mark Talabis, Jason Martin, 2012
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Mark Talabis, Jason Martin, 2012
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Mark Talabis, Jason Martin, 2012
Information security risk management
Daniel Minoli; Jake Kouns
Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010
Sebastian Klipper (auth.), 2011
Information Security Risk Management: Risikomanagement mit ISO/IEC 27001, 27005 und 31010
Sebastian Klipper (auth.), 2015
Managing Information Risk and the Economics of Security
M. Eric Johnson (auth.), M. Eric Johnson (eds.), 2009
Managing information security risks: the OCTAVE approach
Christopher Alberts, Audrey Dorofee, 2002
Managing risk and information security : protect to enable
Harkins, Malcolm, 2013
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins, 2012
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins (auth.), 2013
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins, 2012
Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
Chae Hoon Lim, Taekyoung Kwon (auth.), Peng Ning, Sihan Qing, Ninghui Li (eds.), 2006
Information Security and Cryptology – ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
Thore Graepel, Kristin Lauter, Michael Naehrig (auth.), Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.), 2013
Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
