[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Principles of Information SecurityNovember 2004
Publisher:
  • Course Technology Press
  • 25 Thompson Pl.
  • Boston
  • MA
  • United States
ISBN:978-0-619-21625-2
Published:01 November 2004
Skip Bibliometrics Section
Reflects downloads up to 21 Jan 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Kearney W and Kruger H (2016). Can perceptual differences account for enigmatic information security behaviour in an organisation?, Computers and Security, 61:C, (46-58), Online publication date: 1-Aug-2016.
  2. Park W, Na O and Chang H (2016). An exploratory research on advanced smart media security design for sustainable intelligence information system, Multimedia Tools and Applications, 75:11, (6059-6070), Online publication date: 1-Jun-2016.
  3. Ahmad A, Lim J, Maynard S and Chang S (2020). Information Security Culture, International Journal of Cyber Warfare and Terrorism, 5:2, (31-52), Online publication date: 1-Apr-2015.
  4. Afzal W Rethinking information privacy-security Proceedings of the 76th ASIS&T Annual Meeting: Beyond the Cloud: Rethinking Information Boundaries, (1-10)
  5. Al‐Shawi A (2011). Data mining techniques for information security applications, WIREs Computational Statistics, 3:3, (221-229), Online publication date: 4-Apr-2011.
  6. ACM
    Ngugi B, Kahn B and Tremaine M (2011). Typing Biometrics, Journal of Data and Information Quality, 2:2, (1-21), Online publication date: 1-Feb-2011.
  7. Cavusoglu H, Raghunathan S and Cavusoglu H (2009). Configuration of and Interaction Between Information Security Technologies, Information Systems Research, 20:2, (198-217), Online publication date: 1-Jun-2009.
  8. ACM
    Bala D Biometrics and information security Proceedings of the 5th annual conference on Information security curriculum development, (64-66)
  9. Amer S and Hamilton J Understanding security architecture Proceedings of the 2008 Spring simulation multiconference, (335-342)
  10. Geoghegan S (2008). The development of an information assurance program, Journal of Computing Sciences in Colleges, 23:4, (116-123), Online publication date: 1-Apr-2008.
  11. ACM
    Ketel M IT security risk management Proceedings of the 46th annual ACM Southeast Conference, (373-376)
  12. Katz F (2007). Integrating a security awareness program into an information security course, Journal of Computing Sciences in Colleges, 23:2, (181-187), Online publication date: 1-Dec-2007.
  13. ACM
    Goss R, Botha M and von Solms R Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (29-35)
  14. Huang D, Rau P and Salvendy G A survey of factors influencing people's perception of information security Proceedings of the 12th international conference on Human-computer interaction: applications and services, (906-915)
  15. Yuan X, Qadah Y, Xu J, Yu H, Archer R and Chu B (2007). An animated learning tool for Kerberos authentication architecture, Journal of Computing Sciences in Colleges, 22:6, (147-155), Online publication date: 1-Jun-2007.
  16. ACM
    Herzog A and Shahmehri N User help techniques for usable security Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, (11-es)
  17. ACM
    Beachboard J, Cole A, Mellor M, Hernandez S, Aytes K and Massad N A tentative proposal Proceedings of the 3rd annual conference on Information security curriculum development, (194-196)
  18. ACM
    Al-Hamdani W Knowledge flow with information assurance track Proceedings of the 3rd annual conference on Information security curriculum development, (52-57)
  19. ACM
    Spears J The effects of user participation in identifying information security risk in business processes Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the future, (351-352)
  20. ACM
    Werner L Redefining computer literacy in the age of ubiquitous computing Proceedings of the 6th conference on Information technology education, (95-99)
  21. ACM
    Mader A and Srinivasan S Curriculum development related to information security policies and procedures Proceedings of the 2nd annual conference on Information security curriculum development, (49-53)
  22. ACM
    Guimaraes M, Mattord H and Austin R Incorporating security components into database courses Proceedings of the 1st annual conference on Information security curriculum development, (49-52)
  23. Werner L (2004). Teaching principled and practical information security, Journal of Computing Sciences in Colleges, 20:1, (81-89), Online publication date: 1-Oct-2004.
  24. Grubb L and Cuéllar L (2004). Survey of network weapons part 1, Journal of Computing Sciences in Colleges, 19:4, (314-320), Online publication date: 1-Apr-2004.
  25. Summers W and Bosworth E Password policy Proceedings of the winter international synposium on Information and communication technologies, (1-6)
Contributors
  • Kennesaw State University
  • Kennesaw State University
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations